Lucene search

K
cveChromeCVE-2014-3165
HistoryAug 13, 2014 - 4:57 a.m.

CVE-2014-3165

2014-08-1304:57:12
Chrome
web.nvd.nist.gov
50
cve-2014-3165
vulnerability
web sockets
blink
google chrome
remote attack
denial of service
nvd

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7

Confidence

High

EPSS

0.011

Percentile

84.4%

Use-after-free vulnerability in modules/websockets/WorkerThreadableWebSocketChannel.cpp in the Web Sockets implementation in Blink, as used in Google Chrome before 36.0.1985.143, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an unexpectedly long lifetime of a temporary object during method completion.

Affected configurations

Nvd
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
Node
googlechromeRange36.0.1985.142
OR
googlechromeMatch36.0.1985.1
OR
googlechromeMatch36.0.1985.2
OR
googlechromeMatch36.0.1985.3
OR
googlechromeMatch36.0.1985.4
OR
googlechromeMatch36.0.1985.5
OR
googlechromeMatch36.0.1985.6
OR
googlechromeMatch36.0.1985.8
OR
googlechromeMatch36.0.1985.12
OR
googlechromeMatch36.0.1985.13
OR
googlechromeMatch36.0.1985.14
OR
googlechromeMatch36.0.1985.15
OR
googlechromeMatch36.0.1985.16
OR
googlechromeMatch36.0.1985.17
OR
googlechromeMatch36.0.1985.18
OR
googlechromeMatch36.0.1985.19
OR
googlechromeMatch36.0.1985.20
OR
googlechromeMatch36.0.1985.21
OR
googlechromeMatch36.0.1985.22
OR
googlechromeMatch36.0.1985.23
OR
googlechromeMatch36.0.1985.24
OR
googlechromeMatch36.0.1985.25
OR
googlechromeMatch36.0.1985.26
OR
googlechromeMatch36.0.1985.27
OR
googlechromeMatch36.0.1985.28
OR
googlechromeMatch36.0.1985.29
OR
googlechromeMatch36.0.1985.30
OR
googlechromeMatch36.0.1985.31
OR
googlechromeMatch36.0.1985.32
OR
googlechromeMatch36.0.1985.33
OR
googlechromeMatch36.0.1985.34
OR
googlechromeMatch36.0.1985.35
OR
googlechromeMatch36.0.1985.36
OR
googlechromeMatch36.0.1985.37
OR
googlechromeMatch36.0.1985.38
OR
googlechromeMatch36.0.1985.39
OR
googlechromeMatch36.0.1985.40
OR
googlechromeMatch36.0.1985.41
OR
googlechromeMatch36.0.1985.42
OR
googlechromeMatch36.0.1985.43
OR
googlechromeMatch36.0.1985.44
OR
googlechromeMatch36.0.1985.45
OR
googlechromeMatch36.0.1985.46
OR
googlechromeMatch36.0.1985.47
OR
googlechromeMatch36.0.1985.48
OR
googlechromeMatch36.0.1985.49
OR
googlechromeMatch36.0.1985.50
OR
googlechromeMatch36.0.1985.51
OR
googlechromeMatch36.0.1985.52
OR
googlechromeMatch36.0.1985.53
OR
googlechromeMatch36.0.1985.54
OR
googlechromeMatch36.0.1985.55
OR
googlechromeMatch36.0.1985.56
OR
googlechromeMatch36.0.1985.57
OR
googlechromeMatch36.0.1985.58
OR
googlechromeMatch36.0.1985.59
OR
googlechromeMatch36.0.1985.60
OR
googlechromeMatch36.0.1985.61
OR
googlechromeMatch36.0.1985.62
OR
googlechromeMatch36.0.1985.63
OR
googlechromeMatch36.0.1985.64
OR
googlechromeMatch36.0.1985.65
OR
googlechromeMatch36.0.1985.66
OR
googlechromeMatch36.0.1985.67
OR
googlechromeMatch36.0.1985.68
OR
googlechromeMatch36.0.1985.69
OR
googlechromeMatch36.0.1985.70
OR
googlechromeMatch36.0.1985.72
OR
googlechromeMatch36.0.1985.73
OR
googlechromeMatch36.0.1985.74
OR
googlechromeMatch36.0.1985.75
OR
googlechromeMatch36.0.1985.76
OR
googlechromeMatch36.0.1985.77
OR
googlechromeMatch36.0.1985.78
OR
googlechromeMatch36.0.1985.79
OR
googlechromeMatch36.0.1985.81
OR
googlechromeMatch36.0.1985.82
OR
googlechromeMatch36.0.1985.83
OR
googlechromeMatch36.0.1985.84
OR
googlechromeMatch36.0.1985.85
OR
googlechromeMatch36.0.1985.86
OR
googlechromeMatch36.0.1985.87
OR
googlechromeMatch36.0.1985.88
OR
googlechromeMatch36.0.1985.89
OR
googlechromeMatch36.0.1985.90
OR
googlechromeMatch36.0.1985.91
OR
googlechromeMatch36.0.1985.92
OR
googlechromeMatch36.0.1985.93
OR
googlechromeMatch36.0.1985.94
OR
googlechromeMatch36.0.1985.95
OR
googlechromeMatch36.0.1985.96
OR
googlechromeMatch36.0.1985.97
OR
googlechromeMatch36.0.1985.98
OR
googlechromeMatch36.0.1985.99
OR
googlechromeMatch36.0.1985.100
OR
googlechromeMatch36.0.1985.101
OR
googlechromeMatch36.0.1985.102
OR
googlechromeMatch36.0.1985.103
OR
googlechromeMatch36.0.1985.104
OR
googlechromeMatch36.0.1985.105
OR
googlechromeMatch36.0.1985.106
OR
googlechromeMatch36.0.1985.122
OR
googlechromeMatch36.0.1985.123
OR
googlechromeMatch36.0.1985.124
OR
googlechromeMatch36.0.1985.125
OR
googlechromeMatch36.0.1985.126
OR
googlechromeMatch36.0.1985.128
OR
googlechromeMatch36.0.1985.129
OR
googlechromeMatch36.0.1985.130
OR
googlechromeMatch36.0.1985.131
OR
googlechromeMatch36.0.1985.132
OR
googlechromeMatch36.0.1985.133
OR
googlechromeMatch36.0.1985.134
OR
googlechromeMatch36.0.1985.135
OR
googlechromeMatch36.0.1985.138
OR
googlechromeMatch36.0.1985.139
OR
googlechromeMatch36.0.1985.140
OR
googlechromeMatch36.0.1985.141
VendorProductVersionCPE
debiandebian_linux7.0cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
debiandebian_linux8.0cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
googlechrome*cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
googlechrome36.0.1985.1cpe:2.3:a:google:chrome:36.0.1985.1:*:*:*:*:*:*:*
googlechrome36.0.1985.2cpe:2.3:a:google:chrome:36.0.1985.2:*:*:*:*:*:*:*
googlechrome36.0.1985.3cpe:2.3:a:google:chrome:36.0.1985.3:*:*:*:*:*:*:*
googlechrome36.0.1985.4cpe:2.3:a:google:chrome:36.0.1985.4:*:*:*:*:*:*:*
googlechrome36.0.1985.5cpe:2.3:a:google:chrome:36.0.1985.5:*:*:*:*:*:*:*
googlechrome36.0.1985.6cpe:2.3:a:google:chrome:36.0.1985.6:*:*:*:*:*:*:*
googlechrome36.0.1985.8cpe:2.3:a:google:chrome:36.0.1985.8:*:*:*:*:*:*:*
Rows per page:
1-10 of 1201

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7

Confidence

High

EPSS

0.011

Percentile

84.4%