ID

VAR-201401-0267


CVE

CVE-2013-6645


TITLE

Google Chrome of content/browser/web_contents/web_contents_view_aura.cc Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-001202

DESCRIPTION

Use-after-free vulnerability in the OnWindowRemovingFromRootWindow function in content/browser/web_contents/web_contents_view_aura.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving certain print-preview and tab-switch actions that interact with a speech input element. Google Chrome is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the browser and gain unauthorized access, spoof the displayed URI in the address bar, or cause denial-of-service conditions; other attacks may also be possible. Versions prior to Chrome 32.0.1700.76 are vulnerable. Note: The issue described by CVE-2013-6643 has been moved to BID 64981 (Google Chrome CVE-2013-6643 Unspecified Security Vulnerability) for better documentation. Google Chrome is a web browser developed by Google (Google). A remote attacker could exploit this vulnerability to cause a denial of service or other effects. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201403-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium, V8: Multiple vulnerabilities Date: March 05, 2014 Bugs: #486742, #488148, #491128, #491326, #493364, #498168, #499502, #501948, #503372 ID: 201403-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been reported in Chromium and V8, worst of which may allow execution of arbitrary code. Background ========== Chromium is an open-source web browser project. V8 is Google's open source JavaScript engine. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 33.0.1750.146 >= 33.0.1750.146 2 dev-lang/v8 < 3.20.17.13 Vulnerable! ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities have been discovered in Chromium and V8. Please review the CVE identifiers and release notes referenced below for details. Impact ====== A context-dependent attacker could entice a user to open a specially crafted web site or JavaScript program using Chromium or V8, possibly resulting in the execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass security restrictions or have other unspecified impact. Workaround ========== There is no known workaround at this time. Resolution ========== All chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/chromium-33.0.1750.1= 46" Gentoo has discontinued support for separate V8 package. We recommend that users unmerge V8: # emerge --unmerge "dev-lang/v8" References ========== [ 1 ] CVE-2013-2906 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2906 [ 2 ] CVE-2013-2907 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2907 [ 3 ] CVE-2013-2908 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2908 [ 4 ] CVE-2013-2909 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2909 [ 5 ] CVE-2013-2910 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2910 [ 6 ] CVE-2013-2911 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2911 [ 7 ] CVE-2013-2912 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2912 [ 8 ] CVE-2013-2913 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2913 [ 9 ] CVE-2013-2915 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2915 [ 10 ] CVE-2013-2916 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2916 [ 11 ] CVE-2013-2917 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2917 [ 12 ] CVE-2013-2918 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2918 [ 13 ] CVE-2013-2919 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2919 [ 14 ] CVE-2013-2920 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2920 [ 15 ] CVE-2013-2921 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2921 [ 16 ] CVE-2013-2922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2922 [ 17 ] CVE-2013-2923 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2923 [ 18 ] CVE-2013-2925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2925 [ 19 ] CVE-2013-2926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2926 [ 20 ] CVE-2013-2927 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2927 [ 21 ] CVE-2013-2928 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2928 [ 22 ] CVE-2013-2931 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2931 [ 23 ] CVE-2013-6621 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6621 [ 24 ] CVE-2013-6622 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6622 [ 25 ] CVE-2013-6623 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6623 [ 26 ] CVE-2013-6624 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6624 [ 27 ] CVE-2013-6625 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6625 [ 28 ] CVE-2013-6626 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6626 [ 29 ] CVE-2013-6627 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6627 [ 30 ] CVE-2013-6628 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6628 [ 31 ] CVE-2013-6632 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6632 [ 32 ] CVE-2013-6634 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6634 [ 33 ] CVE-2013-6635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6635 [ 34 ] CVE-2013-6636 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6636 [ 35 ] CVE-2013-6637 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6637 [ 36 ] CVE-2013-6638 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6638 [ 37 ] CVE-2013-6639 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6639 [ 38 ] CVE-2013-6640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6640 [ 39 ] CVE-2013-6641 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6641 [ 40 ] CVE-2013-6643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6643 [ 41 ] CVE-2013-6644 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6644 [ 42 ] CVE-2013-6645 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6645 [ 43 ] CVE-2013-6646 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6646 [ 44 ] CVE-2013-6649 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6649 [ 45 ] CVE-2013-6650 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6650 [ 46 ] CVE-2013-6652 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6652 [ 47 ] CVE-2013-6653 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6653 [ 48 ] CVE-2013-6654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6654 [ 49 ] CVE-2013-6655 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6655 [ 50 ] CVE-2013-6656 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6656 [ 51 ] CVE-2013-6657 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6657 [ 52 ] CVE-2013-6658 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6658 [ 53 ] CVE-2013-6659 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6659 [ 54 ] CVE-2013-6660 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6660 [ 55 ] CVE-2013-6661 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6661 [ 56 ] CVE-2013-6663 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6663 [ 57 ] CVE-2013-6664 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6664 [ 58 ] CVE-2013-6665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6665 [ 59 ] CVE-2013-6666 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6666 [ 60 ] CVE-2013-6667 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6667 [ 61 ] CVE-2013-6668 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6668 [ 62 ] CVE-2013-6802 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6802 [ 63 ] CVE-2014-1681 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1681 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201403-01.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2862-1 security@debian.org http://www.debian.org/security/ Michael Gilbert February 16, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : chromium-browser Vulnerability : several CVE ID : CVE-2013-6641 CVE-2013-6643 CVE-2013-6644 CVE-2013-6645 CVE-2013-6646 CVE-2013-6649 CVE-2013-6650 Several vulnerabilities have been discovered in the chromium web browser. CVE-2013-6641 Atte Kettunen discovered a use-after-free issue in Blink/Webkit form elements. CVE-2013-6643 Joao Lucas Melo Brasio discovered a Google account information disclosure issue related to the one-click sign-on feature. CVE-2013-6644 The chrome development team discovered and fixed multiple issues with potential security impact. CVE-2013-6645 Khalil Zhani discovered a use-after-free issue related to speech input. CVE-2013-6646 Colin Payne discovered a use-after-free issue in the web workers implementation. CVE-2013-6649 Atte Kettunen discovered a use-after-free issue in the Blink/Webkit SVG implementation. CVE-2013-6650 Christian Holler discovered a memory corruption in the v8 javascript library. For the stable distribution (wheezy), these problems have been fixed in version 32.0.1700.123-1~deb7u1. For the testing distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 32.0.1700.123-1. We recommend that you upgrade your chromium-browser packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQQcBAEBCgAGBQJTAPwuAAoJELjWss0C1vRzHu0f/i51htbha+JCafx87gIm1vU/ z2cLhHDzWEKk47Bhl8Y0BJzl5lMCwAxmBfKaHLLz2/UQvNY4Eva1Jsj0o297KX1z qHl32L0yAblue5n+iWmccx9/vZ2d0Bj0/tYk8LGZ2W4IzzqhNbRsV2Grq14mA6N0 ne9EMmsJenir8tQBk1GD8yFA4QWStzIxGt0Mmvtt8EdE7Vwk6cBb5wProY9aFwCX hsui4ysoZL6kZdmlN/hrrZmtA8j7Vnq8v/sgAKZgvXY/b0tBjWQOGyDdDBEECtk7 Y991Zg8IhQCBwt1euICFVKGkdAwq/6mlJAxKJEnzlvj9hw3TiWTFFSkk3fqQJkT1 T/aDoWrGUsPc0iDYo0GrFsJejLvD3jznQiWLU21b+j8GYS6gJoZJDbv8VCwoCHCn rG+NiRoI9p1DwTWTOSs3h3ypp8On77CC0w3VsNErVv0+GMxQteo+2W85R2AxhdWH B5RnDfxS/J6DG6dlkkjf3mkUxbT2VidT0TZMDFtqKwREiyEaXRMuUm9BmIIixO2W nJybfpYJVKmlDsJjmMq6+1jUL1nXAm8AtbWEHS/yHapqlykOSjA2zt4UqOSaOVwz x5ZiWB5aVf13atISUTJsv6tSZ3OnBjUzW0wHM4D+cw8DMjC9ruoqpoy3hsToCBvi CesvjFirPNQnQQmltaNvek6lT9b1C8W5lm3IQhj9jiylAPF15Lenfk1YrxTMQ6cd EI6mRCDCeF1gq1lRopVJkbY0AuHWRHHQpwgiyuAznY+E3iKSksAVVZVfcoO70jxY q6Ht3lXT5g6tF5GbGE1gZAZn6rm5M3I8fRkBq/7hiKV77ex8g8EdtgvDzN0Jipea VGL/yQo5/Bn2h+600tWurExSKNlbvUkoTL2/ORJDl79J3n6C8XSGG9I3IpAw/ncx u26fOfxuQGw/y18QkCvW+J3s8i8v3sdn2NjDI/rS0djUGN4KTZRMFajvthYf1IJg KhbO/d5D+iZGqNC+B5S8RnDj91xW/tL4KG3hcYlrfRH6o4F1BSeh7q/kQDpnZSNt z6jXGl1bnPlACRDTDWSNTci2NnlVIj6qIB8V5Lf9BAEDHgQS/Gvv+hVwqJZqIiKC gdpWEdhZEw4ExsFT8oOUqINbXIG68YujeUwC5gBXStA5YZbnJBMuVU05BOB/3Gsp zX7W0IEUxaTrDmKqNLNilZ5soBl63Dei4hOOnsnVvBDfuO6HEJNd/kVzB5nV4yYZ 0tujnudHHdfHFVhonzrbUu75Ryk9Y36Md0+cp2n51na2BK2ljdOUUab5x3xbFTQo PsuIbyJJIrRt+t0cu4S7X47ajZMH/cpQLJTZO0jCeWIOvlX00EyXXtDhLa+sPkA= =yzUa -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2013-6645 // JVNDB: JVNDB-2014-001202 // BID: 64805 // VULHUB: VHN-66647 // PACKETSTORM: 125545 // PACKETSTORM: 125229

AFFECTED PRODUCTS

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.3

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:32.0.1700.77

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:32.0.1700.76

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:32.0.1700.76 (windows)

Trust: 0.8

vendor:googlemodel:chromescope:ltversion:32.0.1700.77 (mac os x and linux)

Trust: 0.8

vendor:googlemodel:chromescope:eqversion:32.0.1658.1

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:32.0.1652.1

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:32.0.1651.2

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:32.0.1658.2

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:32.0.1652.0

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:32.0.1658.0

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:32.0.1653.1

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:32.0.1659.0

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:32.0.1653.0

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:32.0.1659.1

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.1549

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.498.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.497.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.400.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.399.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.398.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.397.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.326.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.325.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.324.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.323.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.321.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.320.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.319.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.318.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.316.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.315.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.313.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.309.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.308.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.2

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0.193.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.190.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.182.2

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.170.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.159.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.158.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.156.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.153.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.152.1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

sources: BID: 64805 // JVNDB: JVNDB-2014-001202 // CNNVD: CNNVD-201401-345 // NVD: CVE-2013-6645

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-6645
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-6645
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201401-345
value: MEDIUM

Trust: 0.6

VULHUB: VHN-66647
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-6645
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2013-6645
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-66647
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-66647 // JVNDB: JVNDB-2014-001202 // CNNVD: CNNVD-201401-345 // NVD: CVE-2013-6645

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-66647 // JVNDB: JVNDB-2014-001202 // NVD: CVE-2013-6645

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201401-345

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201401-345

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001202

PATCH

title:Issue 320183url:http://code.google.com/p/chromium/issues/detail?id=320183

Trust: 0.8

title:Revision 235302url:https://src.chromium.org/viewvc/chrome?revision=235302&view=revision

Trust: 0.8

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2014/01/stable-channel-update.html

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:ChromeStandaloneSetup_32.0.1700.76url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47623

Trust: 0.6

title:googlechrome_32.0.1700.76url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47625

Trust: 0.6

title:ChromeSetup_32.0.1700.76url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47624

Trust: 0.6

sources: JVNDB: JVNDB-2014-001202 // CNNVD: CNNVD-201401-345

EXTERNAL IDS

db:NVDid:CVE-2013-6645

Trust: 3.0

db:JVNDBid:JVNDB-2014-001202

Trust: 0.8

db:CNNVDid:CNNVD-201401-345

Trust: 0.7

db:BIDid:64805

Trust: 0.3

db:VULHUBid:VHN-66647

Trust: 0.1

db:PACKETSTORMid:125545

Trust: 0.1

db:PACKETSTORMid:125229

Trust: 0.1

sources: VULHUB: VHN-66647 // BID: 64805 // JVNDB: JVNDB-2014-001202 // PACKETSTORM: 125545 // PACKETSTORM: 125229 // CNNVD: CNNVD-201401-345 // NVD: CVE-2013-6645

REFERENCES

url:http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html

Trust: 1.7

url:https://code.google.com/p/chromium/issues/detail?id=318791

Trust: 1.7

url:http://www.debian.org/security/2014/dsa-2862

Trust: 1.7

url:http://code.google.com/p/chromium/issues/detail?id=320183

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html

Trust: 1.7

url:https://src.chromium.org/viewvc/chrome?revision=235302&view=revision

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6645

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6645

Trust: 0.8

url:http://www.google.com/chrome

Trust: 0.3

url:https://src.chromium.org/viewvc/chrome?revision=235302&amp;view=revision

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6621

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2910

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2928

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6628

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2908

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2921

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2931

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6637

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6657

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2926

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2912

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2915

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2908

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2918

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6668

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2906

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201403-01.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6665

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6653

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6632

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6649

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6802

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6641

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6639

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6640

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6636

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6661

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2927

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6663

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2909

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6626

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6645

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6666

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6667

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2917

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6646

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6634

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6660

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2907

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2918

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6650

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2909

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6621

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2925

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1681

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2915

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2919

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2907

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6655

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2911

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2911

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2917

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6635

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6623

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6654

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2927

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2925

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6659

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2920

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6626

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2921

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2913

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2926

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2919

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6638

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6644

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2906

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6625

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6623

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6627

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6656

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6624

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6624

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6664

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2923

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2913

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6622

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6622

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2931

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6658

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2922

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2920

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2922

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2912

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6652

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2923

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6644

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6646

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6650

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6649

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6645

Trust: 0.1

sources: VULHUB: VHN-66647 // BID: 64805 // JVNDB: JVNDB-2014-001202 // PACKETSTORM: 125545 // PACKETSTORM: 125229 // CNNVD: CNNVD-201401-345 // NVD: CVE-2013-6645

CREDITS

Collin Payne, Atte Kettunen of OUSPG, lpilorz, Joao Lucas Melo Brasio and Khalil Zhani.

Trust: 0.3

sources: BID: 64805

SOURCES

db:VULHUBid:VHN-66647
db:BIDid:64805
db:JVNDBid:JVNDB-2014-001202
db:PACKETSTORMid:125545
db:PACKETSTORMid:125229
db:CNNVDid:CNNVD-201401-345
db:NVDid:CVE-2013-6645

LAST UPDATE DATE

2025-04-11T21:08:08.860000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-66647date:2020-08-28T00:00:00
db:BIDid:64805date:2014-03-07T01:04:00
db:JVNDBid:JVNDB-2014-001202date:2014-01-20T00:00:00
db:CNNVDid:CNNVD-201401-345date:2020-09-01T00:00:00
db:NVDid:CVE-2013-6645date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-66647date:2014-01-16T00:00:00
db:BIDid:64805date:2014-01-14T00:00:00
db:JVNDBid:JVNDB-2014-001202date:2014-01-20T00:00:00
db:PACKETSTORMid:125545date:2014-03-05T18:11:17
db:PACKETSTORMid:125229date:2014-02-18T01:16:54
db:CNNVDid:CNNVD-201401-345date:2014-01-22T00:00:00
db:NVDid:CVE-2013-6645date:2014-01-16T12:17:26.407