CVE-2013-2919

Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.1:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.2:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.4:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.5:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.6:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.7:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.8:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.9:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.10:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.11:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.12:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.13:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.14:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.15:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.16:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.17:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.18:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.19:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.20:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.21:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.22:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.23:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.24:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.25:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.26:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.27:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.28:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.29:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.30:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.31:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.32:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.33:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.34:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.35:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.36:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.37:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.38:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.39:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.40:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.41:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.42:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.43:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.44:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.47:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.48:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.49:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.50:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.51:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.52:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.53:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.56:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.57:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.58:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.59:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.60:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.61:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:30.0.1599.64:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:52

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html - () http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html -
References () http://www.debian.org/security/2013/dsa-2785 - () http://www.debian.org/security/2013/dsa-2785 -
References () https://code.google.com/p/chromium/issues/detail?id=282736 - () https://code.google.com/p/chromium/issues/detail?id=282736 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18840 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18840 -

07 Nov 2023, 02:15

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html -
References (DEBIAN) http://www.debian.org/security/2013/dsa-2785 - Third Party Advisory () http://www.debian.org/security/2013/dsa-2785 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=282736 - Vendor Advisory () https://code.google.com/p/chromium/issues/detail?id=282736 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html -

Information

Published : 2013-10-02 10:35

Updated : 2024-11-21 01:52


NVD link : CVE-2013-2919

Mitre link : CVE-2013-2919

CVE.ORG link : CVE-2013-2919


JSON object : View

Products Affected

debian

  • debian_linux

google

  • chrome

opensuse

  • opensuse
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer