CVE-2013-6631

HIGH

Description

Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.

References

http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html

http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html

http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html

http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html

http://www.debian.org/security/2013/dsa-2799

https://code.google.com/p/chromium/issues/detail?id=296804

https://code.google.com/p/webrtc/source/detail?r=4827

https://webrtc-codereview.appspot.com/2275008

Details

Source: MITRE

Published: 2013-11-19

Updated: 2014-03-06

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH