7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
7 High
AI Score
Confidence
High
0.013 Low
EPSS
Percentile
86.2%
Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html
lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html
lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html
lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
www.debian.org/security/2013/dsa-2799
code.google.com/p/chromium/issues/detail?id=296804
code.google.com/p/webrtc/source/detail?r=4827
webrtc-codereview.appspot.com/2275008