Vulnerabilidad en Google Chrome (CVE-2013-2877)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
10/07/2013
Última modificación:
11/04/2025
Descripción
parser.c en libxml2 anterior a 2.9.0 utilizada en Google Chrome anterior a 28.0.1500.71 y otros productos, permite a atacantes remotos provocar una denegación de servicio (lectura fuera de rango) a través de un documento que finaliza de golpe, relacionado con la falta de determinadas validaciones para el estado XML_PARSER_EOF.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | 28.0.1500.70 (incluyendo) | |
| cpe:2.3:a:google:chrome:28.0.1500.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.15:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz
- http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba%3Dcommit%3Bh%3De5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1
- http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/54172
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2724
- http://www.debian.org/security/2013/dsa-2779
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/61050
- http://www.ubuntu.com/usn/USN-1904-1
- http://www.ubuntu.com/usn/USN-1904-2
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://code.google.com/p/chromium/issues/detail?id=229019
- ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz
- http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba%3Dcommit%3Bh%3De5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1
- http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/54172
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2724
- http://www.debian.org/security/2013/dsa-2779
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/61050
- http://www.ubuntu.com/usn/USN-1904-1
- http://www.ubuntu.com/usn/USN-1904-2
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://code.google.com/p/chromium/issues/detail?id=229019



