ID

VAR-201305-0182


CVE

CVE-2013-2842


TITLE

Google Chrome Used in etc. Webkit Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-002786

DESCRIPTION

Use-after-free vulnerability in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of widgets. Google Chrome Used in etc. Webkit The widget (widget) Use of freed memory due to flaws in processing (Use-after-free) Service disruption (DoS) There are vulnerabilities that are subject to unspecified impact, such as being put into a state.Service disruption by a third party (DoS) There is a possibility of being affected unspecified, such as being in a state. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a web page containing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. Note: This issue was previously discussed in BID 60056 (Google Chrome Prior to 27.0.1453.93 Multiple Security Vulnerabilities), but has been moved to its own record for better documentation. Versions prior to Chrome 27.0.1453.93 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2695-1 security@debian.org http://www.debian.org/security/ Michael Gilbert May 29, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : chromium-browser Vulnerability : several issues Problem type : remote Debian-specific: no CVE ID : CVE-2013-2837 CVE-2013-2838 CVE-2013-2839 CVE-2013-2840 CVE-2013-2841 CVE-2013-2842 CVE-2013-2843 CVE-2013-2844 CVE-2013-2845 CVE-2013-2846 CVE-2013-2847 CVE-2013-2848 CVE-2013-2849 Several vulnerabilities have been discovered in the chromium web browser. Multiple use-after-free, out-of-bounds read, memory safety, and cross-site scripting issues were discovered and corrected. For the oldstable distribution (squeeze), the security support window for chromium has ended. Users of chromium on oldstable are very highly encouraged to upgrade to the current stable Debian release (wheezy). Chromium security support for wheezy will last until the next stable release (jessie), which is expected to happen sometime in 2015. For the stable distribution (wheezy), these problems have been fixed in version 27.0.1453.93-1~deb7u1. For the testing distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 27.0.1453.93-1. We recommend that you upgrade your chromium-browser packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlGmD3oACgkQNxpp46476apeGACfaB/wc8U8a0fzYtlgsjM3RCKi +OAAnjXaWyZ6iCvfBw0zUI8BcsR+4Lcr =BCRy -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-01-22-1 iTunes 11.1.4 iTunes 11.1.4 is now available and addresses the following: iTunes Available for: Mac OS X v10.6.8 or later, Windows 8, Windows 7, Vista, XP SP2 or later Impact: An attacker with a privileged network position may control the contents of the iTunes Tutorials window Description: The contents of the iTunes Tutorials window are retrieved from the network using an unprotected HTTP connection. An attacker with a privileged network position may inject arbitrary contents. This issue was addressed by using an encrypted HTTPS connection to retrieve tutorials. CVE-ID CVE-2014-1242 : Apple iTunes Available for: Windows 8, Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access issue existed in the handling of text tracks. This issue was addressed by additional validation of text tracks. CVE-ID CVE-2013-1024 : Richard Kuo and Billy Suguitan of Triemt Corporation iTunes Available for: Windows 8, Windows 7, Vista, XP SP2 or later Impact: A man-in-the-middle attack while browsing the iTunes Store via iTunes may lead to an unexpected application termination or arbitrary code executionn Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2013-1037 : Google Chrome Security Team CVE-2013-1038 : Google Chrome Security Team CVE-2013-1039 : own-hero Research working with iDefense VCP CVE-2013-1040 : Google Chrome Security Team CVE-2013-1041 : Google Chrome Security Team CVE-2013-1042 : Google Chrome Security Team CVE-2013-1043 : Google Chrome Security Team CVE-2013-1044 : Apple CVE-2013-1045 : Google Chrome Security Team CVE-2013-1046 : Google Chrome Security Team CVE-2013-1047 : miaubiz CVE-2013-2842 : Cyril Cattiaux CVE-2013-5125 : Google Chrome Security Team CVE-2013-5126 : Apple CVE-2013-5127 : Google Chrome Security Team CVE-2013-5128 : Apple libxml Available for: Windows 8, Windows 7, Vista, XP SP2 or later Impact: A man-in-the-middle attack while browsing the iTunes Store via iTunes may lead to an unexpected application termination or arbitrary code executionn Description: Multiple memory corruption issues existed in libxml. These issues were addressed by updating libxml to version 2.9.0. CVE-ID CVE-2011-3102 : Juri Aedla CVE-2012-0841 CVE-2012-2807 : Juri Aedla CVE-2012-5134 : Google Chrome Security Team (Juri Aedla) libxslt Available for: Windows 8, Windows 7, Vista, XP SP2 or later Impact: A man-in-the-middle attack while browsing the iTunes Store via iTunes may lead to an unexpected application termination or arbitrary code executionn Description: Multiple memory corruption issues existed in libxslt. These issues were addressed by updating libxslt to version 1.1.28. CVE-ID CVE-2012-2825 : Nicolas Gregoire CVE-2012-2870 : Nicolas Gregoire CVE-2012-2871 : Kai Lu of Fortinet's FortiGuard Labs, Nicolas Gregoire iTunes 11.1.4 may be obtained from: http://www.apple.com/itunes/download/ For OS X: The download file is named: iTunes11.1.4.dmg Its SHA-1 digest is: ffde4658def154edfa479696e40588e9252e7276 For Windows XP / Vista / Windows 7 / Windows 8: The download file is named: "iTunesSetup.exe" Its SHA-1 digest is: 3701f3e7f7c44bad05631533f2ab52e08ae0ba1f For 64-bit Windows XP / Vista / Windows 7 / Windows 8: The download file is named: "iTunes64Setup.exe" Its SHA-1 digest is: fd9caee83907b9f6aa01d031f63fa9ed9be2bfab Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJS4DtWAAoJEPefwLHPlZEwEyIQAJ4B3eB18xKixTw39CTkiIf2 dQlDo2gk8ghBHTS4ZQU74OuGyEall3AgXqz/ENrrapgTT9Ej+OVtcofZIOM7IuFC svag6TSYEkvNLbQMfhVOYvEbwc1Is56tu9huWgYpGpPrZYF0LfNyUYUd3DuWQ2de 1P2vfeowCxd9Orp2aw5w48gJkCFHcxtKpY7QSenn9ZEVKo7KM9ejwQqLWwdwwK45 koP3ovYJa61eLjth61+f85H2xkb6zB6zM5qGPwxNRknPdttabl+NNxiR93jvAoMr 8OUSMErSjxUN9HSBd+ZXtCCmK+NmYnYJk1HtIq11p4OZk8XvNVzzh3JtePAXoRjj 6xQsoC0EjxzV7aYPaje2aiY3XfuT4gLX1NI+ZnTNfy6Y3BMZ8FId1XnBESyevMXw AowaQk6FNiz3qHNTSaJCmjMtVScu2m9OKANGexadETw2/NFMRsfHdDEf7bN8Lj85 MbPhgFW6qMKjJ15g0NW1gvvZjbJCcL6Y2LdjabWFeIJLV7gXE3lviIwMwFfQqBqN B+w6o6PQPrGxSzSGzjIf/76qLYJjL7zenGERCHJiOH54LMITZn8db3lECY1CMUXw lsKk4W7IeI2u43hxaYaYfSpdjF14U2CrRJSFHcyFe2oPxU26hxCax3AyHLxncPoX eWabnIgZ1wYWZB0y8x5K =pK6I -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201309-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Chromium, V8: Multiple vulnerabilities Date: September 24, 2013 Bugs: #442096, #444826, #445246, #446944, #451334, #453610, #458644, #460318, #460776, #463426, #470920, #472350, #476344, #479048, #481990 ID: 201309-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been reported in Chromium and V8, some of which may allow execution of arbitrary code. Background ========== Chromium is an open-source web browser project. V8 is Google's open source JavaScript engine. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 29.0.1457.57 >= 29.0.1457.57 2 dev-lang/v8 < 3.18.5.14 >= 3.18.5.14 ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities have been discovered in Chromium and V8. Please review the CVE identifiers and release notes referenced below for details. Impact ====== A context-dependent attacker could entice a user to open a specially crafted web site or JavaScript program using Chromium or V8, possibly resulting in the execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass security restrictions or have other, unspecified, impact. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-29.0.1457.57" All V8 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/v8-3.18.5.14" References ========== [ 1 ] CVE-2012-5116 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5116 [ 2 ] CVE-2012-5117 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5117 [ 3 ] CVE-2012-5118 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5118 [ 4 ] CVE-2012-5119 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5119 [ 5 ] CVE-2012-5120 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5120 [ 6 ] CVE-2012-5121 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5121 [ 7 ] CVE-2012-5122 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5122 [ 8 ] CVE-2012-5123 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5123 [ 9 ] CVE-2012-5124 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5124 [ 10 ] CVE-2012-5125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5125 [ 11 ] CVE-2012-5126 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5126 [ 12 ] CVE-2012-5127 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127 [ 13 ] CVE-2012-5128 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5128 [ 14 ] CVE-2012-5130 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5130 [ 15 ] CVE-2012-5132 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5132 [ 16 ] CVE-2012-5133 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5133 [ 17 ] CVE-2012-5135 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5135 [ 18 ] CVE-2012-5136 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5136 [ 19 ] CVE-2012-5137 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5137 [ 20 ] CVE-2012-5138 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5138 [ 21 ] CVE-2012-5139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5139 [ 22 ] CVE-2012-5140 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5140 [ 23 ] CVE-2012-5141 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5141 [ 24 ] CVE-2012-5142 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5142 [ 25 ] CVE-2012-5143 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5143 [ 26 ] CVE-2012-5144 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144 [ 27 ] CVE-2012-5145 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5145 [ 28 ] CVE-2012-5146 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5146 [ 29 ] CVE-2012-5147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5147 [ 30 ] CVE-2012-5148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5148 [ 31 ] CVE-2012-5149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5149 [ 32 ] CVE-2012-5150 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5150 [ 33 ] CVE-2012-5151 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5151 [ 34 ] CVE-2012-5152 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5152 [ 35 ] CVE-2012-5153 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5153 [ 36 ] CVE-2012-5154 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5154 [ 37 ] CVE-2013-0828 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0828 [ 38 ] CVE-2013-0829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0829 [ 39 ] CVE-2013-0830 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0830 [ 40 ] CVE-2013-0831 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0831 [ 41 ] CVE-2013-0832 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0832 [ 42 ] CVE-2013-0833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0833 [ 43 ] CVE-2013-0834 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0834 [ 44 ] CVE-2013-0835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0835 [ 45 ] CVE-2013-0836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0836 [ 46 ] CVE-2013-0837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0837 [ 47 ] CVE-2013-0838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0838 [ 48 ] CVE-2013-0839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0839 [ 49 ] CVE-2013-0840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0840 [ 50 ] CVE-2013-0841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0841 [ 51 ] CVE-2013-0842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0842 [ 52 ] CVE-2013-0879 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0879 [ 53 ] CVE-2013-0880 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0880 [ 54 ] CVE-2013-0881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0881 [ 55 ] CVE-2013-0882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0882 [ 56 ] CVE-2013-0883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0883 [ 57 ] CVE-2013-0884 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0884 [ 58 ] CVE-2013-0885 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0885 [ 59 ] CVE-2013-0887 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0887 [ 60 ] CVE-2013-0888 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0888 [ 61 ] CVE-2013-0889 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0889 [ 62 ] CVE-2013-0890 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0890 [ 63 ] CVE-2013-0891 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0891 [ 64 ] CVE-2013-0892 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0892 [ 65 ] CVE-2013-0893 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0893 [ 66 ] CVE-2013-0894 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0894 [ 67 ] CVE-2013-0895 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0895 [ 68 ] CVE-2013-0896 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0896 [ 69 ] CVE-2013-0897 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0897 [ 70 ] CVE-2013-0898 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0898 [ 71 ] CVE-2013-0899 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0899 [ 72 ] CVE-2013-0900 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900 [ 73 ] CVE-2013-0902 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0902 [ 74 ] CVE-2013-0903 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0903 [ 75 ] CVE-2013-0904 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0904 [ 76 ] CVE-2013-0905 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0905 [ 77 ] CVE-2013-0906 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0906 [ 78 ] CVE-2013-0907 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0907 [ 79 ] CVE-2013-0908 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0908 [ 80 ] CVE-2013-0909 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0909 [ 81 ] CVE-2013-0910 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0910 [ 82 ] CVE-2013-0911 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0911 [ 83 ] CVE-2013-0912 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0912 [ 84 ] CVE-2013-0916 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0916 [ 85 ] CVE-2013-0917 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0917 [ 86 ] CVE-2013-0918 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0918 [ 87 ] CVE-2013-0919 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0919 [ 88 ] CVE-2013-0920 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0920 [ 89 ] CVE-2013-0921 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0921 [ 90 ] CVE-2013-0922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0922 [ 91 ] CVE-2013-0923 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0923 [ 92 ] CVE-2013-0924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0924 [ 93 ] CVE-2013-0925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0925 [ 94 ] CVE-2013-0926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0926 [ 95 ] CVE-2013-2836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2836 [ 96 ] CVE-2013-2837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2837 [ 97 ] CVE-2013-2838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2838 [ 98 ] CVE-2013-2839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2839 [ 99 ] CVE-2013-2840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2840 [ 100 ] CVE-2013-2841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2841 [ 101 ] CVE-2013-2842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2842 [ 102 ] CVE-2013-2843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2843 [ 103 ] CVE-2013-2844 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2844 [ 104 ] CVE-2013-2845 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2845 [ 105 ] CVE-2013-2846 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2846 [ 106 ] CVE-2013-2847 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2847 [ 107 ] CVE-2013-2848 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2848 [ 108 ] CVE-2013-2849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2849 [ 109 ] CVE-2013-2853 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2853 [ 110 ] CVE-2013-2855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2855 [ 111 ] CVE-2013-2856 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2856 [ 112 ] CVE-2013-2857 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2857 [ 113 ] CVE-2013-2858 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2858 [ 114 ] CVE-2013-2859 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2859 [ 115 ] CVE-2013-2860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2860 [ 116 ] CVE-2013-2861 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2861 [ 117 ] CVE-2013-2862 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2862 [ 118 ] CVE-2013-2863 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2863 [ 119 ] CVE-2013-2865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2865 [ 120 ] CVE-2013-2867 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2867 [ 121 ] CVE-2013-2868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2868 [ 122 ] CVE-2013-2869 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2869 [ 123 ] CVE-2013-2870 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2870 [ 124 ] CVE-2013-2871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2871 [ 125 ] CVE-2013-2874 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2874 [ 126 ] CVE-2013-2875 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2875 [ 127 ] CVE-2013-2876 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2876 [ 128 ] CVE-2013-2877 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877 [ 129 ] CVE-2013-2878 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2878 [ 130 ] CVE-2013-2879 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2879 [ 131 ] CVE-2013-2880 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2880 [ 132 ] CVE-2013-2881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2881 [ 133 ] CVE-2013-2882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2882 [ 134 ] CVE-2013-2883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2883 [ 135 ] CVE-2013-2884 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2884 [ 136 ] CVE-2013-2885 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2885 [ 137 ] CVE-2013-2886 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2886 [ 138 ] CVE-2013-2887 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2887 [ 139 ] CVE-2013-2900 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2900 [ 140 ] CVE-2013-2901 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2901 [ 141 ] CVE-2013-2902 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2902 [ 142 ] CVE-2013-2903 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2903 [ 143 ] CVE-2013-2904 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2904 [ 144 ] CVE-2013-2905 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2905 [ 145 ] Release Notes 23.0.1271.64 http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html [ 146 ] Release Notes 23.0.1271.91 http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html [ 147 ] Release Notes 23.0.1271.95 http://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201309-16.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.43

sources: NVD: CVE-2013-2842 // JVNDB: JVNDB-2013-002786 // BID: 60067 // VULHUB: VHN-62844 // VULMON: CVE-2013-2842 // PACKETSTORM: 121799 // PACKETSTORM: 124932 // PACKETSTORM: 121801 // PACKETSTORM: 123382

AFFECTED PRODUCTS

vendor:googlemodel:chromescope:eqversion:27.0.1453.77

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:27.0.1453.57

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:27.0.1453.55

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:27.0.1453.52

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:27.0.1453.79

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:27.0.1453.78

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:27.0.1453.54

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:27.0.1453.58

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:27.0.1453.76

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:27.0.1453.56

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.83

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.11

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.68

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.15

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.70

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.5

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.50

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:6.1.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.61

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.71

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.89

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.90

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.80

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.60

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.65

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.87

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.51

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.36

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.13

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.7

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.66

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.41

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.84

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.5

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.74

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.63

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.0

vendor:googlemodel:chromescope:lteversion:27.0.1453.91

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.69

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.43

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.39

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.38

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.1.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.64

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.10

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.34

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.40

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.75

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.6

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.88

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.82

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.67

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.73

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.85

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.44

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.47

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.46

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.9

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.86

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.8

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.72

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.62

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.59

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.45

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.81

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.12

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.35

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.8

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.37

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.42

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:27.0.1453.49

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:27.0.1453.93

Trust: 0.8

vendor:applemodel:tvscope:ltversion:6.0 (apple tv first 2 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (iphone 4 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows 7)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows 8)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows vista)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows xp sp2 or later )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.1 (os x server v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.1 (os x v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.1 (os x v10.8.3)

Trust: 0.8

vendor:srwaremodel:ironscope:eqversion:9.0.600.1

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:8.0.555.1

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:8.0.555.0

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:18.0.1050.0

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:15.0.900.1

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:13.0.800.0

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:13.0

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:11.0.700.2

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:11.0.700.1

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:11.0.700.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

sources: BID: 60067 // JVNDB: JVNDB-2013-002786 // CNNVD: CNNVD-201305-475 // NVD: CVE-2013-2842

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-2842
value: HIGH

Trust: 1.0

NVD: CVE-2013-2842
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201305-475
value: HIGH

Trust: 0.6

VULHUB: VHN-62844
value: HIGH

Trust: 0.1

VULMON: CVE-2013-2842
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-2842
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-62844
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-62844 // VULMON: CVE-2013-2842 // JVNDB: JVNDB-2013-002786 // CNNVD: CNNVD-201305-475 // NVD: CVE-2013-2842

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-62844 // JVNDB: JVNDB-2013-002786 // NVD: CVE-2013-2842

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201305-475

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201305-475

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002786

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-62844 // VULMON: CVE-2013-2842

PATCH

title:APPLE-SA-2013-10-22-8url:http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html

Trust: 0.8

title:APPLE-SA-2013-10-22-2url:http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html

Trust: 0.8

title:APPLE-SA-2013-09-18-2url:http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935

Trust: 0.8

title:HT6000url:http://support.apple.com/kb/HT6000

Trust: 0.8

title:HT6001url:http://support.apple.com/kb/HT6001

Trust: 0.8

title:HT6001url:http://support.apple.com/kb/HT6001?viewlocale=ja_JP

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934?viewlocale=ja_JP

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935?viewlocale=ja_JP

Trust: 0.8

title:HT6000url:http://support.apple.com/kb/HT6000?viewlocale=ja_JP

Trust: 0.8

title:DSA-2695url:http://www.debian.org/security/2013/dsa-2695

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:Stable Channel Releaseurl:http://googlechromereleases.blogspot.jp/2013/05/stable-channel-release.html

Trust: 0.8

title:Google Chrome_27.0.1453.93url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45982

Trust: 0.6

title:Debian Security Advisories: DSA-2695-1 chromium-browser -- several issuesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=769edca39022eeab0c0d72ca24926606

Trust: 0.1

title:libwiiuurl:https://github.com/wiiudev/libwiiu

Trust: 0.1

title: - url:https://github.com/khulnasoft-labs/awesome-security

Trust: 0.1

sources: VULMON: CVE-2013-2842 // JVNDB: JVNDB-2013-002786 // CNNVD: CNNVD-201305-475

EXTERNAL IDS

db:NVDid:CVE-2013-2842

Trust: 3.3

db:SECUNIAid:54886

Trust: 1.2

db:JVNid:JVNVU98681940

Trust: 0.8

db:JVNid:JVNVU95174988

Trust: 0.8

db:JVNid:JVNVU94321146

Trust: 0.8

db:JVNDBid:JVNDB-2013-002786

Trust: 0.8

db:CNNVDid:CNNVD-201305-475

Trust: 0.7

db:SECUNIAid:53430

Trust: 0.6

db:BIDid:60067

Trust: 0.4

db:EXPLOIT-DBid:40243

Trust: 0.2

db:VULHUBid:VHN-62844

Trust: 0.1

db:VULMONid:CVE-2013-2842

Trust: 0.1

db:PACKETSTORMid:121799

Trust: 0.1

db:PACKETSTORMid:124932

Trust: 0.1

db:PACKETSTORMid:121801

Trust: 0.1

db:PACKETSTORMid:123382

Trust: 0.1

sources: VULHUB: VHN-62844 // VULMON: CVE-2013-2842 // BID: 60067 // JVNDB: JVNDB-2013-002786 // PACKETSTORM: 121799 // PACKETSTORM: 124932 // PACKETSTORM: 121801 // PACKETSTORM: 123382 // CNNVD: CNNVD-201305-475 // NVD: CVE-2013-2842

REFERENCES

url:http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html

Trust: 1.8

url:https://code.google.com/p/chromium/issues/detail?id=226696

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2013/sep/msg00006.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2013/oct/msg00003.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2013/oct/msg00009.html

Trust: 1.2

url:http://support.apple.com/kb/ht5934

Trust: 1.2

url:http://support.apple.com/kb/ht6001

Trust: 1.2

url:http://www.debian.org/security/2013/dsa-2695

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15914

Trust: 1.2

url:http://secunia.com/advisories/54886

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2842

Trust: 0.8

url:http://jvn.jp/cert/jvnvu98681940/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu95174988/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94321146/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2842

Trust: 0.8

url:http://secunia.com/advisories/53430

Trust: 0.6

url:http://www.google.com/chrome

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-2842

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-2837

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2847

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2845

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2843

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2846

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2841

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2849

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2838

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2844

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2839

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2848

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2840

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://github.com/wiiudev/libwiiu

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/40243/

Trust: 0.1

url:https://www.debian.org/security/./dsa-2695

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1039

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1045

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0841

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1024

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5125

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1043

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1041

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1040

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1038

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5126

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1042

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2825

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1046

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2871

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2870

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1047

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5127

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1242

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1037

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3102

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5133

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0894

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2848

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2862

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5130

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2905

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2876

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0879

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5150

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5136

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0881

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2857

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5126

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5128

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0906

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2870

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201309-16.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5146

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2856

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0895

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0899

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0904

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2874

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5116

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0830

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5138

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5153

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0880

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0905

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2900

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5140

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2877

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0833

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0828

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2847

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0918

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0902

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2863

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2849

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0831

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0900

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5126

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5121

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5133

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0911

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0925

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0921

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0897

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0920

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0917

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0908

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2885

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5120

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0896

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0889

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0836

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5144

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5146

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2840

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5141

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5145

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2882

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5143

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2880

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2878

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2859

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5125

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0882

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5137

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5144

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2879

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0919

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5118

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2867

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0923

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5119

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5122

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2902

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5125

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5122

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0892

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5120

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2855

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5117

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5121

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2846

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2887

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5152

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5128

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2869

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5117

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5132

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2903

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2842

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5143

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5123

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0884

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0885

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0829

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2844

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2861

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0890

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2865

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0841

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5116

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0893

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0916

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5154

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2860

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2884

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5145

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0922

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2871

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5118

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2901

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0924

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0912

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0909

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2904

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5132

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5119

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5148

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0832

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0898

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2841

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0842

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2858

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2886

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0891

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0903

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5151

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2845

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2881

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0907

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0834

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0926

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5138

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0910

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0888

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2853

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5139

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2875

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0887

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2843

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5137

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5123

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5140

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5139

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5141

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: VULHUB: VHN-62844 // VULMON: CVE-2013-2842 // BID: 60067 // JVNDB: JVNDB-2013-002786 // PACKETSTORM: 121799 // PACKETSTORM: 124932 // PACKETSTORM: 121801 // PACKETSTORM: 123382 // CNNVD: CNNVD-201305-475 // NVD: CVE-2013-2842

CREDITS

Cyril Cattiaux

Trust: 0.3

sources: BID: 60067

SOURCES

db:VULHUBid:VHN-62844
db:VULMONid:CVE-2013-2842
db:BIDid:60067
db:JVNDBid:JVNDB-2013-002786
db:PACKETSTORMid:121799
db:PACKETSTORMid:124932
db:PACKETSTORMid:121801
db:PACKETSTORMid:123382
db:CNNVDid:CNNVD-201305-475
db:NVDid:CVE-2013-2842

LAST UPDATE DATE

2025-04-11T22:19:12.444000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-62844date:2017-09-19T00:00:00
db:VULMONid:CVE-2013-2842date:2017-09-19T00:00:00
db:BIDid:60067date:2014-01-24T00:53:00
db:JVNDBid:JVNDB-2013-002786date:2014-02-03T00:00:00
db:CNNVDid:CNNVD-201305-475date:2013-05-23T00:00:00
db:NVDid:CVE-2013-2842date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-62844date:2013-05-22T00:00:00
db:VULMONid:CVE-2013-2842date:2013-05-22T00:00:00
db:BIDid:60067date:2013-05-21T00:00:00
db:JVNDBid:JVNDB-2013-002786date:2013-05-23T00:00:00
db:PACKETSTORMid:121799date:2013-05-29T18:33:03
db:PACKETSTORMid:124932date:2014-01-24T01:33:33
db:PACKETSTORMid:121801date:2013-05-31T01:41:31
db:PACKETSTORMid:123382date:2013-09-24T22:44:00
db:CNNVDid:CNNVD-201305-475date:2013-05-23T00:00:00
db:NVDid:CVE-2013-2842date:2013-05-22T13:29:56.043