ID CVE-2013-2931
Summary Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors.
References
Vulnerable Configurations
  • Google Chrome 31.0.1650.47
    cpe:2.3:a:google:chrome:31.0.1650.47
  • Google Chrome 31.0.1650.46
    cpe:2.3:a:google:chrome:31.0.1650.46
  • Google Chrome 31.0.1650.45
    cpe:2.3:a:google:chrome:31.0.1650.45
  • Google Chrome 31.0.1650.44
    cpe:2.3:a:google:chrome:31.0.1650.44
  • Google Chrome 31.0.1650.43
    cpe:2.3:a:google:chrome:31.0.1650.43
  • Google Chrome 31.0.1650.42
    cpe:2.3:a:google:chrome:31.0.1650.42
  • Google Chrome 31.0.1650.41
    cpe:2.3:a:google:chrome:31.0.1650.41
  • Google Chrome 31.0.1650.39
    cpe:2.3:a:google:chrome:31.0.1650.39
  • Google Chrome 31.0.1650.38
    cpe:2.3:a:google:chrome:31.0.1650.38
  • Google Chrome 31.0.1650.37
    cpe:2.3:a:google:chrome:31.0.1650.37
  • Google Chrome 31.0.1650.36
    cpe:2.3:a:google:chrome:31.0.1650.36
  • Google Chrome 31.0.1650.35
    cpe:2.3:a:google:chrome:31.0.1650.35
  • Google Chrome 31.0.1650.34
    cpe:2.3:a:google:chrome:31.0.1650.34
  • Google Chrome 31.0.1650.33
    cpe:2.3:a:google:chrome:31.0.1650.33
  • Google Chrome 31.0.1650.32
    cpe:2.3:a:google:chrome:31.0.1650.32
  • Google Chrome 31.0.1650.31
    cpe:2.3:a:google:chrome:31.0.1650.31
  • Google Chrome 31.0.1650.30
    cpe:2.3:a:google:chrome:31.0.1650.30
  • Google Chrome 31.0.1650.29
    cpe:2.3:a:google:chrome:31.0.1650.29
  • Google Chrome 31.0.1650.28
    cpe:2.3:a:google:chrome:31.0.1650.28
  • Google Chrome 31.0.1650.27
    cpe:2.3:a:google:chrome:31.0.1650.27
  • Google Chrome 31.0.1650.26
    cpe:2.3:a:google:chrome:31.0.1650.26
  • Google Chrome 31.0.1650.25
    cpe:2.3:a:google:chrome:31.0.1650.25
  • Google Chrome 31.0.1650.23
    cpe:2.3:a:google:chrome:31.0.1650.23
  • Google Chrome 31.0.1650.22
    cpe:2.3:a:google:chrome:31.0.1650.22
  • Google Chrome 31.0.1650.20
    cpe:2.3:a:google:chrome:31.0.1650.20
  • Google Chrome 31.0.1650.19
    cpe:2.3:a:google:chrome:31.0.1650.19
  • Google Chrome 31.0.1650.18
    cpe:2.3:a:google:chrome:31.0.1650.18
  • Google Chrome 31.0.1650.17
    cpe:2.3:a:google:chrome:31.0.1650.17
  • Google Chrome 31.0.1650.16
    cpe:2.3:a:google:chrome:31.0.1650.16
  • Google Chrome 31.0.1650.15
    cpe:2.3:a:google:chrome:31.0.1650.15
  • Google Chrome 31.0.1650.14
    cpe:2.3:a:google:chrome:31.0.1650.14
  • Google Chrome 31.0.1650.13
    cpe:2.3:a:google:chrome:31.0.1650.13
  • Google Chrome 31.0.1650.12
    cpe:2.3:a:google:chrome:31.0.1650.12
  • Google Chrome 31.0.1650.11
    cpe:2.3:a:google:chrome:31.0.1650.11
  • Google Chrome 31.0.1650.10
    cpe:2.3:a:google:chrome:31.0.1650.10
  • Google Chrome 31.0.1650.9
    cpe:2.3:a:google:chrome:31.0.1650.9
  • Google Chrome 31.0.1650.8
    cpe:2.3:a:google:chrome:31.0.1650.8
  • Google Chrome 31.0.1650.7
    cpe:2.3:a:google:chrome:31.0.1650.7
  • Google Chrome 31.0.1650.6
    cpe:2.3:a:google:chrome:31.0.1650.6
  • Google Chrome 31.0.1650.5
    cpe:2.3:a:google:chrome:31.0.1650.5
  • Google Chrome 31.0.1650.4
    cpe:2.3:a:google:chrome:31.0.1650.4
  • Google Chrome 31.0.1650.3
    cpe:2.3:a:google:chrome:31.0.1650.3
  • Google Chrome 31.0.1650.2
    cpe:2.3:a:google:chrome:31.0.1650.2
  • Google Chrome 31.0.1650.0
    cpe:2.3:a:google:chrome:31.0.1650.0
CVSS
Base: 10.0 (as of 13-11-2013 - 12:16)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2013-961.NASL
    description Chromium was updated to 31.0.1650.57: Stable channel update : - Security Fixes : - CVE-2013-6632: Multiple memory corruption issues. - Update to Chromium 31.0.1650.48 Stable Channel update : - Security fixes : - CVE-2013-6621: Use after free related to speech input elements.. - CVE-2013-6622: Use after free related to media elements. - CVE-2013-6623: Out of bounds read in SVG. - CVE-2013-6624: Use after free related to “id” attribute strings. - CVE-2013-6625: Use after free in DOM ranges. - CVE-2013-6626: Address bar spoofing related to interstitial warnings. - CVE-2013-6627: Out of bounds read in HTTP parsing. - CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. - CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. - CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. - CVE-2013-6631: Use after free in libjingle. - Added patch chromium-fix-chromedriver-build.diff to fix the chromedriver build - Enable ARM build for Chromium. - Added patches chromium-arm-webrtc-fix.patch, chromium-fix-arm-icu.patch and chromium-fix-arm-sysroot.patch to resolve ARM specific build issues - Update to Chromium 30.0.1599.114 Stable Channel update: fix build for 32bit systems - Drop patch chromium-fix-chromedriver-build.diff. This is now fixed upstream - For openSUSE versions lower than 13.1, build against the in-tree libicu - Update to Chromium 30.0.1599.101 - Security Fixes : + CVE-2013-2925: Use after free in XHR + CVE-2013-2926: Use after free in editing + CVE-2013-2927: Use after free in forms. + CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives. - Update to Chromium 30.0.1599.66 - Easier searching by image - A number of new apps/extension APIs - Lots of under the hood changes for stability and performance - Security fixes : + CVE-2013-2906: Races in Web Audio + CVE-2013-2907: Out of bounds read in Window.prototype object + CVE-2013-2908: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2909: Use after free in inline-block rendering + CVE-2013-2910: Use-after-free in Web Audio + CVE-2013-2911: Use-after-free in XSLT + CVE-2013-2912: Use-after-free in PPAPI + CVE-2013-2913: Use-after-free in XML document parsing + CVE-2013-2914: Use after free in the Windows color chooser dialog + CVE-2013-2915: Address bar spoofing via a malformed scheme + CVE-2013-2916: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2917: Out of bounds read in Web Audio + CVE-2013-2918: Use-after-free in DOM + CVE-2013-2919: Memory corruption in V8 + CVE-2013-2920: Out of bounds read in URL parsing + CVE-2013-2921: Use-after-free in resource loader + CVE-2013-2922: Use-after-free in template element + CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives + CVE-2013-2924: Use-after-free in ICU. Upstream bug
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75225
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75225
    title openSUSE Security Update : chromium (openSUSE-SU-2013:1861-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2014-37.NASL
    description - Update to Chromium 31.0.1650.63 Stable channel update : - Security fixes : - CVE-2013-6634: Session fixation in sync related to 302 redirects - CVE-2013-6635: Use-after-free in editing - CVE-2013-6636: Address bar spoofing related to modal dialogs - CVE-2013-6637: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2013-6638: Buffer overflow in v8 - CVE-2013-6639: Out of bounds write in v8. - CVE-2013-6640: Out of bounds read in v8 - and 12 other security fixes. - Remove the build flags to build according to the Chrome ffmpeg branding and the proprietary codecs. (bnc#847971) - Update to Chromium 31.0.1650.57 Stable channel update : - Security Fixes : - CVE-2013-6632: Multiple memory corruption issues. - Update to Chromium 31.0.1650.48 Stable Channel update : - Security fixes : - CVE-2013-6621: Use after free related to speech input elements.. - CVE-2013-6622: Use after free related to media elements. - CVE-2013-6623: Out of bounds read in SVG. - CVE-2013-6624: Use after free related to “id” attribute strings. - CVE-2013-6625: Use after free in DOM ranges. - CVE-2013-6626: Address bar spoofing related to interstitial warnings. - CVE-2013-6627: Out of bounds read in HTTP parsing. - CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. - CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. - CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. - CVE-2013-6631: Use after free in libjingle. - Added patch chromium-fix-chromedriver-build.diff to fix the chromedriver build - Enable ARM build for Chromium. - Added patches chromium-arm-webrtc-fix.patch, chromium-fix-arm-icu.patch and chromium-fix-arm-sysroot.patch to resolve ARM specific build issues - Update to Chromium 30.0.1599.114 Stable Channel update: fix build for 32bit systems - Drop patch chromium-fix-chromedriver-build.diff. This is now fixed upstream - For openSUSE versions lower than 13.1, build against the in-tree libicu - Update to Chromium 30.0.1599.101 - Security Fixes : + CVE-2013-2925: Use after free in XHR + CVE-2013-2926: Use after free in editing + CVE-2013-2927: Use after free in forms. + CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives. - Update to Chromium 30.0.1599.66 - Easier searching by image - A number of new apps/extension APIs - Lots of under the hood changes for stability and performance - Security fixes : + CVE-2013-2906: Races in Web Audio + CVE-2013-2907: Out of bounds read in Window.prototype object + CVE-2013-2908: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2909: Use after free in inline-block rendering + CVE-2013-2910: Use-after-free in Web Audio + CVE-2013-2911: Use-after-free in XSLT + CVE-2013-2912: Use-after-free in PPAPI + CVE-2013-2913: Use-after-free in XML document parsing + CVE-2013-2914: Use after free in the Windows color chooser dialog + CVE-2013-2915: Address bar spoofing via a malformed scheme + CVE-2013-2916: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2917: Out of bounds read in Web Audio + CVE-2013-2918: Use-after-free in DOM + CVE-2013-2919: Memory corruption in V8 + CVE-2013-2920: Out of bounds read in URL parsing + CVE-2013-2921: Use-after-free in resource loader + CVE-2013-2922: Use-after-free in template element + CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives + CVE-2013-2924: Use-after-free in ICU. Upstream bug
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75366
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75366
    title openSUSE Security Update : chromium (openSUSE-SU-2014:0065-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2013-904.NASL
    description Chromium was updated to 31.0.1650.57: Stable channel update : - Security Fixes : - CVE-2013-6632: Multiple memory corruption issues. - Update to Chromium 31.0.1650.48 (bnc#850430) Stable Channel update : - Security fixes : - CVE-2013-6621: Use after free related to speech input elements.. - CVE-2013-6622: Use after free related to media elements. - CVE-2013-6623: Out of bounds read in SVG. - CVE-2013-6624: Use after free related to “id” attribute strings. - CVE-2013-6625: Use after free in DOM ranges. - CVE-2013-6626: Address bar spoofing related to interstitial warnings. - CVE-2013-6627: Out of bounds read in HTTP parsing. - CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. - CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. - CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. - CVE-2013-6631: Use after free in libjingle. - Added patch chromium-fix-chromedriver-build.diff to fix the chromedriver build
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75213
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75213
    title openSUSE Security Update : chromium (openSUSE-SU-2013:1777-1)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201403-01.NASL
    description The remote host is affected by the vulnerability described in GLSA-201403-01 (Chromium, V8: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium and V8. Please review the CVE identifiers and release notes referenced below for details. Impact : A context-dependent attacker could entice a user to open a specially crafted website or JavaScript program using Chromium or V8, possibly resulting in the execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass security restrictions or have other unspecified impact. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-10-29
    plugin id 72851
    published 2014-03-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72851
    title GLSA-201403-01 : Chromium, V8: Multiple vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2799.NASL
    description Several vulnerabilities have been discovered in the chromium web browser. - CVE-2013-2931 The chrome 31 development team found various issues from internal fuzzing, audits, and other studies. - CVE-2013-6621 Khalil Zhani discovered a use-after-free issue in speech input handling. - CVE-2013-6622 'cloudfuzzer' discovered a use-after-free issue in HTMLMediaElement. - CVE-2013-6623 'miaubiz' discovered an out-of-bounds read in the Blink/Webkit SVG implementation. - CVE-2013-6624 Jon Butler discovered a use-after-free issue in id attribute strings. - CVE-2013-6625 'cloudfuzzer' discovered a use-after-free issue in the Blink/Webkit DOM implementation. - CVE-2013-6626 Chamal de Silva discovered an address bar spoofing issue. - CVE-2013-6627 'skylined' discovered an out-of-bounds read in the HTTP stream parser. - CVE-2013-6628 Antoine Delignat-Lavaud and Karthikeyan Bhargavan of INRIA Paris discovered that a different (unverified) certificate could be used after successful TLS renegotiation with a valid certificate. - CVE-2013-6629 Michal Zalewski discovered an uninitialized memory read in the libjpeg and libjpeg-turbo libraries. - CVE-2013-6630 Michal Zalewski discovered another uninitialized memory read in the libjpeg and libjpeg-turbo libraries. - CVE-2013-6631 Patrik Hoglund discovered a use-free issue in the libjingle library. - CVE-2013-6632 Pinkie Pie discovered multiple memory corruption issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 70986
    published 2013-11-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70986
    title Debian DSA-2799-1 : chromium-browser - several vulnerabilities
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_3BFC70164BCC11E3B0CF00262D5ED8EE.NASL
    description Google Chrome Releases reports : 25 security fixes in this release, including : - [268565] Medium CVE-2013-6621: Use after free related to speech input elements. Credit to Khalil Zhani. - [272786] High CVE-2013-6622: Use after free related to media elements. Credit to cloudfuzzer. - [282925] High CVE-2013-6623: Out of bounds read in SVG. Credit to miaubiz. - [290566] High CVE-2013-6624: Use after free related to 'id' attribute strings. Credit to Jon Butler. - [295010] High CVE-2013-6625: Use after free in DOM ranges. Credit to cloudfuzzer. - [295695] Low CVE-2013-6626: Address bar spoofing related to interstitial warnings. Credit to Chamal de Silva. - [299892] High CVE-2013-6627: Out of bounds read in HTTP parsing. Credit to skylined. - [306959] Medium CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. Credit to Antoine Delignat-Lavaud and Karthikeyan Bhargavan from Prosecco of INRIA Paris. - [315823] Medium-Critical CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. - [258723] Medium CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. Credit to Michal Zalewski of Google. - [299835] Medium CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. Credit to Michal Zalewski of Google. - [296804] High CVE-2013-6631: Use after free in libjingle. Credit to Patrik Hoglund of the Chromium project.
    last seen 2019-02-21
    modified 2016-05-27
    plugin id 70865
    published 2013-11-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70865
    title FreeBSD : chromium -- multiple vulnerabilities (3bfc7016-4bcc-11e3-b0cf-00262d5ed8ee)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2013-903.NASL
    description Security and bugfix update to Chromium 31.0.1650.57 - Update to Chromium 31.0.1650.57 : - Security Fixes : - CVE-2013-6632: Multiple memory corruption issues. - Update to Chromium 31.0.1650.48 Stable Channel update : - Security fixes : - CVE-2013-6621: Use after free related to speech input elements.. - CVE-2013-6622: Use after free related to media elements. - CVE-2013-6623: Out of bounds read in SVG. - CVE-2013-6624: Use after free related to “id” attribute strings. - CVE-2013-6625: Use after free in DOM ranges. - CVE-2013-6626: Address bar spoofing related to interstitial warnings. - CVE-2013-6627: Out of bounds read in HTTP parsing. - CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. - CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. - CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. - CVE-2013-6631: Use after free in libjingle. - Stable Channel update: fix build for 32bit systems - Update to Chromium 30.0.1599.101 - Security Fixes : + CVE-2013-2925: Use after free in XHR + CVE-2013-2926: Use after free in editing + CVE-2013-2927: Use after free in forms. + CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives. - Enable ARM build for Chromium.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75212
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75212
    title openSUSE Security Update : chromium (openSUSE-SU-2013:1776-1)
  • NASL family Windows
    NASL id GOOGLE_CHROME_31_0_1650_48.NASL
    description The version of Google Chrome installed on the remote host is a version prior to 31.0.1650.48. It is, therefore, affected by multiple vulnerabilities : - Various, unspecified errors exist. (CVE-2013-2931) - Use-after-free errors exist related to speech input elements, media elements, 'id' attribute strings, DOM ranges, and libjingle. (CVE-2013-6621, CVE-2013-6622, CVE-2013-6624, CVE-2013-6625, CVE-2013-6631) - Out-of-bounds read errors exist in SVG and HTTP parsing. (CVE-2013-6623, CVE-2013-6627) - An address bar URI-spoofing vulnerability exists that is related to interstitial warnings. (CVE-2013-6626) - A certificate validation security bypass issue exists during TLS renegotiation. (CVE-2013-6628) - A memory corruption error exists in the libjpeg and libjpeg-turbo libraries when memory is uninitialized when decoding images with missing SOS data. (CVE-2013-6629) - A memory corruption error exists in the 'jdmarker.c' source file in the libjpeg-turbo library when processing Huffman tables. (CVE-2013-6630)
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 70916
    published 2013-11-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70916
    title Google Chrome < 31.0.1650.48 Multiple Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_GOOGLE_CHROME_31_0_1650_48.NASL
    description The version of Google Chrome installed on the remote Mac OS X host is a version prior to 31.0.1650.48. It is, therefore, affected by multiple vulnerabilities : - Various, unspecified errors exist. (CVE-2013-2931) - Use-after-free errors exist related to speech input elements, media elements, 'id' attribute strings, DOM ranges, and libjingle. (CVE-2013-6621, CVE-2013-6622, CVE-2013-6624, CVE-2013-6625, CVE-2013-6631) - Out-of-bounds read errors exist in SVG and HTTP parsing. (CVE-2013-6623, CVE-2013-6627) - An address bar URI-spoofing vulnerability exists that is related to interstitial warnings. (CVE-2013-6626) - A certificate validation security bypass issue exists during TLS renegotiation. (CVE-2013-6628) - A memory corruption error exists in the libjpeg and libjpeg-turbo libraries when memory is uninitialized when decoding images with missing SOS data. (CVE-2013-6629) - A memory corruption error exists in the 'jdmarker.c' source file in the libjpeg-turbo library when processing Huffman tables. (CVE-2013-6630)
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 70917
    published 2013-11-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70917
    title Google Chrome < 31.0.1650.48 Multiple Vulnerabilities (Mac OS X)
oval via4
accepted 2013-12-23T04:01:03.871-05:00
class vulnerability
contributors
name Shane Shaffer
organization G2, Inc.
definition_extensions
comment Google Chrome is installed
oval oval:org.mitre.oval:def:11914
description Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors.
family windows
id oval:org.mitre.oval:def:19183
status accepted
submitted 2013-11-14T09:33:27.010-05:00
title Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48
version 40
refmap via4
confirm
debian DSA-2799
suse
  • openSUSE-SU-2013:1776
  • openSUSE-SU-2013:1777
  • openSUSE-SU-2013:1861
  • openSUSE-SU-2014:0065
Last major update 05-03-2014 - 23:46
Published 13-11-2013 - 10:55
Last modified 18-09-2017 - 21:36
Back to Top