Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote servers to execute arbitrary code via crafted response traffic after a URL request.
References
Link | Resource |
---|---|
http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=commit;h=5449227016f44d7c023b28a697ada40064c681a6 | Patch Issue Tracking |
http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=commit;h=2b0ff6d8a832f4fe5c187b17342b56675fbf7b96 | Patch Issue Tracking |
https://code.google.com/p/chromium/issues/detail?id=242762 | Patch Issue Tracking |
https://code.google.com/p/chromium/issues/detail?id=244746 | Patch Issue Tracking |
http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html | Vendor Advisory |
http://www.debian.org/security/2013/dsa-2724 | Third Party Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16723 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2013-07-10 03:55
Updated : 2017-09-18 18:36
NVD link : CVE-2013-2870
Mitre link : CVE-2013-2870
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
debian
- debian_linux
- chrome