fkie_cve-2013-6631
Vulnerability from fkie_nvd
Published
2013-11-19 04:50
Modified
2025-04-11 00:51
Severity ?
Summary
Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
References
cve@mitre.orghttp://googlechromereleases.blogspot.com/2013/11/stable-channel-update.htmlVendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
cve@mitre.orghttp://www.debian.org/security/2013/dsa-2799
cve@mitre.orghttps://code.google.com/p/chromium/issues/detail?id=296804
cve@mitre.orghttps://code.google.com/p/webrtc/source/detail?r=4827
cve@mitre.orghttps://webrtc-codereview.appspot.com/2275008Patch
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2799
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=296804
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/webrtc/source/detail?r=4827
af854a3a-2127-422b-91ae-364da2661108https://webrtc-codereview.appspot.com/2275008Patch
Impacted products
Vendor Product Version
google chrome *
google chrome 31.0.1650.0
google chrome 31.0.1650.2
google chrome 31.0.1650.3
google chrome 31.0.1650.4
google chrome 31.0.1650.5
google chrome 31.0.1650.6
google chrome 31.0.1650.7
google chrome 31.0.1650.8
google chrome 31.0.1650.9
google chrome 31.0.1650.10
google chrome 31.0.1650.11
google chrome 31.0.1650.12
google chrome 31.0.1650.13
google chrome 31.0.1650.14
google chrome 31.0.1650.15
google chrome 31.0.1650.16
google chrome 31.0.1650.17
google chrome 31.0.1650.18
google chrome 31.0.1650.19
google chrome 31.0.1650.20
google chrome 31.0.1650.22
google chrome 31.0.1650.23
google chrome 31.0.1650.25
google chrome 31.0.1650.26
google chrome 31.0.1650.27
google chrome 31.0.1650.28
google chrome 31.0.1650.29
google chrome 31.0.1650.30
google chrome 31.0.1650.31
google chrome 31.0.1650.32
google chrome 31.0.1650.33
google chrome 31.0.1650.34
google chrome 31.0.1650.35
google chrome 31.0.1650.36
google chrome 31.0.1650.37
google chrome 31.0.1650.38
google chrome 31.0.1650.39
google chrome 31.0.1650.41
google chrome 31.0.1650.42
google chrome 31.0.1650.43
google chrome 31.0.1650.44
google chrome 31.0.1650.45
google chrome 31.0.1650.46



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D96E10B-3A68-42C3-BC76-16371F70EFB1",
              "versionEndIncluding": "31.0.1650.47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en la funci\u00f3n Channel::SendRTCPPacket de voice_engine/channel.cc en libjingle de WebRTC, tal y como se usa en Google Chrome anterior a la versi\u00f3n 31.0.1650.48 y otros productos, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica) o posiblemente tener otro impacto sin especificar a trav\u00e9s de vectores que desencadene la ausenciade ciertas estad\u00edsticas de inicializaci\u00f3n, llevando a la evasi\u00f3n de una llamada DeRegisterExternalTransport requerida."
    }
  ],
  "evaluatorComment": "CWE-416: Use After Free per http://cwe.mitre.org/data/definitions/416.html",
  "id": "CVE-2013-6631",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-19T04:50:56.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2013/dsa-2799"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://code.google.com/p/chromium/issues/detail?id=296804"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://code.google.com/p/webrtc/source/detail?r=4827"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://webrtc-codereview.appspot.com/2275008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2799"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=296804"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/webrtc/source/detail?r=4827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://webrtc-codereview.appspot.com/2275008"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…