fkie_cve-2013-2877
Vulnerability from fkie_nvd
Published
2013-07-10 10:55
Modified
2024-11-21 01:52
Severity ?
Summary
parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", matchCriteriaId: "C2308189-A2A4-4BF4-9814-8635F24ABBC2", versionEndIncluding: "28.0.1500.70", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.0:*:*:*:*:*:*:*", matchCriteriaId: "2102F988-D7FE-4C6B-B071-FAB66D89CB0D", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.2:*:*:*:*:*:*:*", matchCriteriaId: "2A52A00D-37EB-4E71-A3D5-1A46F1868A41", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.3:*:*:*:*:*:*:*", matchCriteriaId: "552543B1-4690-4175-A17D-54D7CA08BF2E", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.4:*:*:*:*:*:*:*", matchCriteriaId: "4C4EDFF6-400C-45FD-A104-5F4279DAD71B", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.5:*:*:*:*:*:*:*", matchCriteriaId: "6EB3D069-0A5A-4D70-B04A-837B5C1B3AD9", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.6:*:*:*:*:*:*:*", matchCriteriaId: "512D0FC8-F545-4469-90F8-A080AEAB13A6", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.8:*:*:*:*:*:*:*", matchCriteriaId: "79994932-02C8-46D8-8409-C687F7327A4A", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.9:*:*:*:*:*:*:*", matchCriteriaId: "8EA6DE3E-E346-41EE-A9AA-D1EE21EF367E", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.10:*:*:*:*:*:*:*", matchCriteriaId: "D9C28433-3BB5-45E9-B141-822CEDB91578", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.11:*:*:*:*:*:*:*", matchCriteriaId: "5089A0F8-8304-4103-A52F-0AD4D12AB377", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.12:*:*:*:*:*:*:*", matchCriteriaId: "7907622E-FE9D-458A-B41D-BBDEDDE70B87", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.13:*:*:*:*:*:*:*", matchCriteriaId: "7105D8C1-BE13-4A9C-A1E5-A153C51435BB", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.14:*:*:*:*:*:*:*", matchCriteriaId: "288DC523-66DD-404E-9C35-19BB8C81AA8C", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.15:*:*:*:*:*:*:*", matchCriteriaId: "6FC2E33D-BB49-4973-8D3F-B4067EBBDE10", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.16:*:*:*:*:*:*:*", matchCriteriaId: "46C95C7A-BAC1-49D5-AD31-B379F05B5628", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.17:*:*:*:*:*:*:*", matchCriteriaId: "5B037988-A751-4558-8BF0-554A811007A0", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.18:*:*:*:*:*:*:*", matchCriteriaId: "CE39F0F7-9B61-4680-AD52-52524E20F110", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.19:*:*:*:*:*:*:*", matchCriteriaId: "1DF1CC06-48DA-4384-AFC6-7A1119093459", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.20:*:*:*:*:*:*:*", matchCriteriaId: "D6B20E39-F264-41C4-8B18-086E615A77C6", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.21:*:*:*:*:*:*:*", matchCriteriaId: "C057174C-3F75-4407-B9F6-4F1E9D8842FE", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.22:*:*:*:*:*:*:*", matchCriteriaId: "4745501F-8661-4641-8072-E0581BFC41C2", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.23:*:*:*:*:*:*:*", matchCriteriaId: "F3BAA9F3-4A9F-4F2D-BE7C-9D8625690215", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.24:*:*:*:*:*:*:*", matchCriteriaId: "E30C28BC-E337-4C6E-9F7D-681039AA541B", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.25:*:*:*:*:*:*:*", matchCriteriaId: "40113089-6D02-4B42-8FB2-B93AE6A0D4CB", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.26:*:*:*:*:*:*:*", matchCriteriaId: "953AE711-6295-41BC-9B7C-485728946A11", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.27:*:*:*:*:*:*:*", matchCriteriaId: "D4A82B23-6C3D-4AAA-B52D-B6B15E226E54", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.28:*:*:*:*:*:*:*", matchCriteriaId: "F01C37C8-ABF7-4CDC-A718-633E5E103681", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.29:*:*:*:*:*:*:*", matchCriteriaId: "C5DEB512-E8ED-4F5F-8031-4AED42B72B27", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.31:*:*:*:*:*:*:*", matchCriteriaId: "0CAC9DDD-26D1-4A15-B36C-AE13079F6034", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.32:*:*:*:*:*:*:*", matchCriteriaId: "D6F9522B-CF2F-40A8-BA0E-B338A9E871A9", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.33:*:*:*:*:*:*:*", matchCriteriaId: "179DBEF9-FD04-4C44-A419-E8537A65D340", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.34:*:*:*:*:*:*:*", matchCriteriaId: "B340E512-1D43-4DA2-B3A4-D33A0FB81375", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.35:*:*:*:*:*:*:*", matchCriteriaId: "5263FDC2-B2A7-4AFB-B99D-C1F567A3B4AB", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.36:*:*:*:*:*:*:*", matchCriteriaId: "A61378D0-E81E-4C71-8D87-178DDDFA4867", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.37:*:*:*:*:*:*:*", matchCriteriaId: "8502E889-80C6-4E68-94B3-021EDD41FB2F", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.38:*:*:*:*:*:*:*", matchCriteriaId: "9E4E8F52-CFC2-4531-BD67-66978E843DB7", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.39:*:*:*:*:*:*:*", matchCriteriaId: "9082AAC1-9210-4759-9A6A-D25331936054", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.40:*:*:*:*:*:*:*", matchCriteriaId: "D794F153-0D70-44BB-BF56-15F2B3B3DF95", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.41:*:*:*:*:*:*:*", matchCriteriaId: "3AF97A34-B96D-4752-8004-EF2580BD3B0B", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.42:*:*:*:*:*:*:*", matchCriteriaId: "1CF3D341-45E3-4741-A5FF-1CA1D1C84105", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.43:*:*:*:*:*:*:*", matchCriteriaId: "49C331DD-69C4-43E1-A470-ED0CB560D331", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.44:*:*:*:*:*:*:*", matchCriteriaId: "FF1AAE18-3565-463C-ABEA-51E6CBE08F7A", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.45:*:*:*:*:*:*:*", matchCriteriaId: "B8B8408F-14F3-481D-AD1F-5AE2B11FD4DC", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.46:*:*:*:*:*:*:*", matchCriteriaId: "7804BC53-2543-43B6-AB92-929EEB75704C", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.47:*:*:*:*:*:*:*", matchCriteriaId: "577FA02C-A930-43A5-B48F-0236DF20A007", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.48:*:*:*:*:*:*:*", matchCriteriaId: "0BE2CE01-CEC2-4F54-A967-4E86E2014024", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.49:*:*:*:*:*:*:*", matchCriteriaId: "71371339-DD76-41F1-8C1A-59CA3AD04707", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.50:*:*:*:*:*:*:*", matchCriteriaId: "8C0FECB8-6EEF-4DF7-BD07-ECA8542FFA06", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.51:*:*:*:*:*:*:*", matchCriteriaId: "F7037832-5B9F-4B8F-BFC0-51B660E14215", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.52:*:*:*:*:*:*:*", matchCriteriaId: "6B0E12DD-4FDD-46BC-B85F-5A828CF8041E", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.53:*:*:*:*:*:*:*", matchCriteriaId: "761583AE-9299-4CCD-AAE6-AB031EBF8447", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.54:*:*:*:*:*:*:*", matchCriteriaId: "592CE453-782B-4CE5-9396-C9FD9B7EEF88", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.56:*:*:*:*:*:*:*", matchCriteriaId: "A1BB39B0-97DE-47B5-9E86-2B52873687AC", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.58:*:*:*:*:*:*:*", matchCriteriaId: "798CA97C-2E50-495E-B57A-4940568F935D", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.59:*:*:*:*:*:*:*", matchCriteriaId: "30C8219F-FEC8-4318-A94C-251F81BDBD9A", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.60:*:*:*:*:*:*:*", matchCriteriaId: "E323736A-B834-4342-85FB-8FA970C76D88", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.61:*:*:*:*:*:*:*", matchCriteriaId: "F876E661-9999-4566-88FA-D180DFF2A8C8", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.62:*:*:*:*:*:*:*", matchCriteriaId: "72233F37-A5DC-4225-81DF-3FE80D3ABB48", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.63:*:*:*:*:*:*:*", matchCriteriaId: "5064E54C-6B5E-4A23-A970-7AC2CD26401C", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.64:*:*:*:*:*:*:*", matchCriteriaId: "E7DF79D2-2CFA-4247-A92A-A998CB234E3F", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.66:*:*:*:*:*:*:*", matchCriteriaId: "B4904FA7-84DD-4433-9FEE-B93D76AEC1F5", vulnerable: true, }, { criteria: "cpe:2.3:a:google:chrome:28.0.1500.68:*:*:*:*:*:*:*", matchCriteriaId: "85DE6B5E-83AD-469D-A497-05B1715C895C", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:*:rc1:*:*:*:*:*:*", matchCriteriaId: "30E8D5DA-7AF4-486B-AE33-B540F49D32EA", versionEndIncluding: "2.9.0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*", matchCriteriaId: "F2524F0A-AC51-44CB-A4ED-09B70C7E19A9", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*", matchCriteriaId: "569432A3-3145-40CD-BFA8-6B70BE47F3E1", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*", matchCriteriaId: "9635F852-0577-45F6-A301-8DF8108860A6", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*", matchCriteriaId: "D2E409CD-F17C-4A1F-8F84-5E495B2D4652", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*", matchCriteriaId: "E08C8CA8-9F4E-4591-9DDC-C1102F691647", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*", matchCriteriaId: "E973C066-2745-49B5-9FDA-CCD6CE0633B6", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8070C75-15A8-4A9D-AA0F-4D92CC2691ED", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*", matchCriteriaId: "F6EDF7C8-50C8-4A20-975E-06B2D528E2B6", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*", matchCriteriaId: "AE252FCD-647B-4586-A8EC-6BB095BB3E95", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*", matchCriteriaId: "5291EC59-4016-40B3-BF08-292080D19243", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*", matchCriteriaId: "0A84CCC4-6F7E-4563-AE45-AF6B45A7D1B4", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*", matchCriteriaId: "F2E74FC5-77EE-42A9-B2F7-6C4FC2F0CD20", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*", matchCriteriaId: "FADFC1E5-2F83-484B-852B-D71B7D1C5A80", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*", matchCriteriaId: "E2779B6F-AA9F-4D2D-9DD1-9BC9A9042DD7", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*", matchCriteriaId: "B172A659-DC83-483D-8DBE-637E89DF3DFB", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*", matchCriteriaId: "B3FD4D7C-1826-4BC9-BCEA-6FB8D7738D51", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*", matchCriteriaId: "52800CB4-6389-4AB0-A098-8F465CF4A733", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*", matchCriteriaId: "7D499267-5C14-4888-92C7-2ECE909BD9F6", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*", matchCriteriaId: "586C0FAB-E288-4EFB-8946-4535971F23F9", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*", matchCriteriaId: "15236DDC-0095-4253-9113-61F76EFC0769", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*", matchCriteriaId: "98F95AB1-D3D0-4E39-B135-4B55991845CE", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*", matchCriteriaId: "392E4AA7-00D2-45B1-9FA7-C1C7C37431F0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*", matchCriteriaId: "C7839A86-59AA-400C-BF29-18E612B8EB4D", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "0F9A211A-5C44-4BDC-9676-3B7B937835B9", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "BECA085A-BEF1-4AD2-ABBA-069CE2642796", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "E66BF7BC-5B5C-40BB-B826-3CC9DBAB53D0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "F330D609-31EB-4B4C-B007-ACEABA557F54", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D9E2F05B-B298-489C-9E44-62E0A199E148", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "070B2F1F-9A99-4A20-9BA9-CF175D482DA6", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "25DC5AE4-9DEA-4828-96F0-57BACB6C9B25", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "BDE26E6D-53FF-4001-8F25-C112635CB74E", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*", matchCriteriaId: "D1210A8D-5359-4FD4-963F-506200AA20AE", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*", matchCriteriaId: "AA748E50-798F-40EA-B252-0A166DEEB120", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*", matchCriteriaId: "C5B9E7CC-D552-4C9A-909E-42D375452E09", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*", matchCriteriaId: "06C20B5C-16E7-4C1B-A2DB-8EB4B9A7045D", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "D7A901B3-B0F4-4D2B-8CAF-25938219B657", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "12FCBA01-D739-4BA2-83F5-D41A6DF91F1F", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "EFC8C43D-84C7-4C0C-8DD1-66206D665C35", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "5E60C1B4-BBC1-4E2B-8323-A7E059EF6BEE", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "8B677850-4FE9-4522-ADAE-42C5D17D4A7D", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "9BB7931B-55AA-4735-8AAB-9F3A9E9C0123", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "F4A5B9AF-7F82-4EEC-A776-587C6DD44448", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "94D33392-DD5C-4704-BECF-69D416F9F2C0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "B1BA896F-07D7-4B93-939B-B6CDD1DCA87C", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "647CA5AD-5AC2-448E-8445-62837F413361", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "37D4241B-A328-45F0-9FAB-CEE20DC7432E", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "CAAD77C4-84EC-4924-90F8-35A2375AA6A9", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "6A124C5A-C72C-4623-925E-378FF40671EF", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "8ACD2FD4-E884-4FC5-842B-86AAE06D9E05", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "14A9036D-1474-4097-9E70-09F7BBA2826C", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "E8884CF6-2F5B-465F-841B-3C69EC3BE3BA", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "A699B966-3756-4D5B-8693-0678EEDD8AD0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "A1E50FED-4BAD-4D04-98C3-C2427E086C1B", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*", matchCriteriaId: "70880522-BBC0-4D5C-8DA3-245E189FA1C0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "1A8BA1A0-F8E7-4B93-B667-D012C91F831E", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "27662848-9CD5-43BC-9A1B-8C6EBACCCC21", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "C967E50C-E7AA-49D0-A055-20CA083CA232", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "DA398ACA-73C2-4093-AD35-E30161C96C25", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "757B5A74-6B7B-4F01-9891-9F9E510074C9", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*", matchCriteriaId: "5C10CC4C-3A9C-4AD0-A7C1-ACF781BF20D5", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "2E67FD94-4E96-4FCC-990B-4C0A5C599ED0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "8E7DDE27-9DE8-4E45-AFA2-AFFEA8F0D917", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "92CEEDA7-5DFC-4DB0-989E-F356E5CF65A9", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "25D60B58-3558-4244-A5B3-8D16F53A9588", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "E5DB409B-795F-4F8A-85E1-0B4E66AE9D48", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "457C47ED-A429-42AE-9FF9-978D605BACFE", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "3C20B9D5-9E10-4B6D-8095-B2A63EDB8D16", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "9087E4FE-661F-4803-BB3B-09D2699265E5", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "7C2D01CF-9FCE-41F8-997E-EA9BDCCD8C76", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "84E1C7A6-DCA7-4760-B1B6-EFB256978CFC", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9F1E7CFF-E4B3-4B31-BE23-C187544E9488", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "81EDD077-5183-4588-8DB1-93A0597AAA34", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "530FE28C-0D51-4BF9-AE43-D65F9913B48B", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "F030053E-2292-42E2-8435-0CFBDDE688DB", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "A0258377-DD8B-4FA6-B075-E8489C83CEAE", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*", matchCriteriaId: "69E0BD23-38C6-43C0-870F-00B13F7C91D3", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*", matchCriteriaId: "F3D3350E-5186-4DC8-9D1B-59068A469496", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*", matchCriteriaId: "F76783D0-63F8-48A7-85FE-E5E8DBFA223D", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*", matchCriteriaId: "52AE89B2-C1A3-48C8-AEB5-4B0D757AE361", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*", matchCriteriaId: "8ACA170D-21DB-47CD-AD73-2DEB2A2439F1", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*", matchCriteriaId: "FFC48A66-7D1F-4446-BC50-6C1A1DF819E8", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*", matchCriteriaId: "A0A86D90-C64E-4850-8D6E-94D3C0789241", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*", matchCriteriaId: "06A50725-AC7A-4FDB-887A-3DCB369C943D", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*", matchCriteriaId: "D463EC3C-88F1-46D9-ADB6-6283DC23B0B6", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*", matchCriteriaId: "43F8E361-E6D3-4666-B18D-928D550FD5D2", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "B6948CD9-8489-46BA-9159-24C842490702", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "35C43087-760E-482A-B34E-141A29AC57A4", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "669211F7-90EA-47AB-A787-34DD79DF8E25", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "025B16D8-1023-4D47-BADD-C1E838B47D88", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "320E691F-D417-4D81-A223-C46FEFFD908A", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "F3B06B40-327D-4EFA-AD19-DA1CA7D50B4F", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "EB8BEC58-AB2A-4953-A2E8-338EB894A494", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "ABDE6C9A-4F24-42B4-8AA3-3EBC97190322", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "44FB2813-BE9F-46A8-864B-435D883CA0FA", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*", matchCriteriaId: "F9DF1336-F831-4507-B45E-574BDE8AA8BA", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*", matchCriteriaId: "33268B2F-3591-48D9-B123-92E3ABF157F1", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*", matchCriteriaId: "0830367A-9FB3-4291-88C0-38A471DFD22B", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*", matchCriteriaId: "73E4EB1B-2E8B-4504-AB05-F4D4E6B038E9", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*", matchCriteriaId: "B5815E25-5305-4A32-81B3-89DB1D5C1AC0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*", matchCriteriaId: "0AD69C98-11AB-4BB5-A91A-F029BA0E1DB1", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*", matchCriteriaId: "98CF3A74-B9F8-4689-B81C-F579D827DA5C", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*", matchCriteriaId: "6DBD9C7D-CD0B-4B5B-BEC2-F67610DEDE2B", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*", matchCriteriaId: "798F7A01-F006-4589-82F8-943F81015693", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*", matchCriteriaId: "6A1C90C5-1B77-4BE5-ACDA-1F15D3F2A000", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*", matchCriteriaId: "36940C55-BFD4-4C77-A26B-C0F273EAC2EC", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*", matchCriteriaId: "8ECB753E-430C-4DBD-9063-506E749A21CF", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*", matchCriteriaId: "3EBD3E93-1624-4B1D-8F9A-5683ADA4983E", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*", matchCriteriaId: "551B91B8-7A5A-4E5D-AAED-76705F8A2829", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*", matchCriteriaId: "1D8135B1-FB22-4755-A5ED-CDB16E3E85A3", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*", matchCriteriaId: "2B4685BF-394A-4426-980A-2B1D37737C06", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*", matchCriteriaId: "77A68008-7392-4BE4-AB30-24D2BA124E3A", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*", matchCriteriaId: "63F37BF5-D4D2-43AB-841A-E9AC32A68452", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*", matchCriteriaId: "CB8A074B-069A-4520-8E3C-AB614C31B68A", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*", matchCriteriaId: "D77DE5FD-060A-4AD6-A925-4E9EF186C835", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*", matchCriteriaId: "7069A49C-038C-4E7B-AF03-4D90D5734414", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*", matchCriteriaId: "87E895B9-5AF7-4A1F-B740-B3E13DE3254E", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*", matchCriteriaId: "8FD29EFD-1ADB-4349-8E7D-EA6B34B0F6DE", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*", matchCriteriaId: "EC720A50-9EF5-4B73-86D1-AE87D402611E", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*", matchCriteriaId: "464942E8-EDF3-4ECB-B907-FFCDBC9079C0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*", matchCriteriaId: "E1246C0E-DCAC-405E-ADCE-3D16D659C567", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*", matchCriteriaId: "5703D8EC-259B-49C3-AADE-916227DEB96F", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*", matchCriteriaId: "184B40E3-28FD-49A4-9560-5E26293D7D08", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*", matchCriteriaId: "7CCE8BBA-6721-4257-9F2E-23AEB104564E", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*", matchCriteriaId: "AF2A3107-5F12-407E-9009-7F42B09299E4", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*", matchCriteriaId: "8928F415-C124-4B4A-9D59-40AC6845AFD1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.", }, { lang: "es", value: "parser.c en libxml2 anterior a 2.9.0 utilizada en Google Chrome anterior a 28.0.1500.71 y otros productos, permite a atacantes remotos provocar una denegación de servicio (lectura fuera de rango) a través de un documento que finaliza de golpe, relacionado con la falta de determinadas validaciones para el estado XML_PARSER_EOF.", }, ], id: "CVE-2013-2877", lastModified: "2024-11-21T01:52:34.000", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2013-07-10T10:55:02.260", references: [ { source: "chrome-cve-admin@google.com", url: "ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz", }, { source: "chrome-cve-admin@google.com", url: "http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=e5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1", }, { source: "chrome-cve-admin@google.com", url: "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html", }, { source: "chrome-cve-admin@google.com", url: "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html", }, { source: "chrome-cve-admin@google.com", url: "http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html", }, { source: "chrome-cve-admin@google.com", url: "http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html", }, { source: "chrome-cve-admin@google.com", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { source: "chrome-cve-admin@google.com", url: "http://secunia.com/advisories/54172", }, { source: "chrome-cve-admin@google.com", url: "http://secunia.com/advisories/55568", }, { source: "chrome-cve-admin@google.com", url: "http://www.debian.org/security/2013/dsa-2724", }, { source: "chrome-cve-admin@google.com", url: "http://www.debian.org/security/2013/dsa-2779", }, { source: "chrome-cve-admin@google.com", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { source: "chrome-cve-admin@google.com", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { source: "chrome-cve-admin@google.com", url: "http://www.securityfocus.com/bid/61050", }, { source: "chrome-cve-admin@google.com", url: "http://www.ubuntu.com/usn/USN-1904-1", }, { source: "chrome-cve-admin@google.com", url: "http://www.ubuntu.com/usn/USN-1904-2", }, { source: "chrome-cve-admin@google.com", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { source: "chrome-cve-admin@google.com", url: "https://code.google.com/p/chromium/issues/detail?id=229019", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=e5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/54172", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/55568", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2013/dsa-2724", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2013/dsa-2779", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/61050", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-1904-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-1904-2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://code.google.com/p/chromium/issues/detail?id=229019", }, ], sourceIdentifier: "chrome-cve-admin@google.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.