CVE-2013-6631

critical

Description

Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.

References

https://webrtc-codereview.appspot.com/2275008

https://code.google.com/p/webrtc/source/detail?r=4827

https://code.google.com/p/chromium/issues/detail?id=296804

http://www.debian.org/security/2013/dsa-2799

http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html

http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html

http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html

http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html

Details

Source: Mitre, NVD

Published: 2013-11-19

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical