CVE-2009-3933

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

WebKit before r50173, as used in Google Chrome before 3.0.195.32, allows remote attackers to cause a denial of service (CPU consumption) via a web page that calls the JavaScript setInterval method, which triggers an incompatibility between the WTF::currentTime and base::Time functions.

References

http://code.google.com/p/chromium/issues/detail?id=25892

http://codereview.chromium.org/339039

http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html

http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

http://secunia.com/advisories/43068

http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311&r2=30310

http://src.chromium.org/viewvc/chrome?view=rev&revision=30311

http://trac.webkit.org/changeset/50173

http://www.osvdb.org/59745

http://www.vupen.com/english/advisories/2011/0212

https://bugs.webkit.org/show_bug.cgi?id=30833

https://exchange.xforce.ibmcloud.com/vulnerabilities/54297

Details

Source: MITRE

Published: 2009-11-12

Updated: 2017-08-17

Type: CWE-399

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:a:webkit:webkit:*:*:*:*:*:*:*:*

OR

cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.48:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.52:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:1.0.154.65:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.169.0:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.169.1:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.170.0:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172.2:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172.8:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172.27:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172.33:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:2.0.172.38:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:3.0.182.2:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:3.0.190.2:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:3.0.193.2:beta:*:*:*:*:*:*

cpe:2.3:a:google:chrome:3.0.195.21:*:*:*:*:*:*:*

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
75629openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
53764openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
5225Google Chrome < 3.0.195.32 RCENessus Network MonitorWeb Clients
medium