Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-6631

EPSS 1.74% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-6631

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Google Chrome ‘Channel::SendRTCPPacket’函数释放后重用漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Google Chrome是美国谷歌(Google)公司开发的一款Web浏览器,其使用的WebRTC技术支持浏览器进行实时语音对话或视频对话。 Google Chrome 31.0.1650.48之前的版本中使用的WebRTC技术的libjingle库中的voice_engine/channel.cc文件中的‘Channel::SendRTCPPacket’函数中存在释放后重用漏洞。远程攻击者可利用该漏洞造成拒绝服务(堆内存损坏)或产生其他影响。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-6631

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-6631

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-11-15 · 22 CVEs total

CVE-2013-2032Mediawiki ‘Password Reset’安全绕过漏洞
CVE-2013-4557SPIP ‘ecran_securite.php’ PHP代码注入漏洞
CVE-2013-4556SPIP ‘editer_auteur.php’ 跨站脚本漏洞
CVE-2013-4555SPIP ‘logout.php’跨站请求伪造漏洞
CVE-2013-4551Xen 远程拒绝服务漏洞
CVE-2013-4510Tryton ‘main.py’任意文件写入漏洞
CVE-2013-4480Red Hat Satellite 权限许可和访问控制问题漏洞
CVE-2013-4425Pixmeo OsiriX Private Key 本地信息泄露漏洞
CVE-2013-4204Google WebRTC 跨站脚本漏洞
CVE-2013-2114MediaWiki 任意文件上传漏洞
CVE-2013-2061OpenVPN ‘openvpn_decrypt()’函数信息泄露漏洞
CVE-2013-0741ImageGen ‘font’参数跨站脚本漏洞
CVE-2013-2031Mediawiki ‘SVG’文件跨站脚本漏洞
CVE-2013-1057Ubuntu MAAS Server 本地提权漏洞
CVE-2013-6797WordPres Blue Wrench Video Widget插件跨站请求伪造漏洞
CVE-2013-6630libjpeg-turbo 内存损坏漏洞
CVE-2013-6629libjpeg/libjpeg-turbo库内存损坏漏洞
CVE-2013-6042Softaculous Webuzo ‘user’参数跨站脚本漏洞
CVE-2013-5223D-Link DSL-2760U-BN 跨站脚本漏洞和HTML注入漏洞
CVE-2013-4519Beanbag Review Board 跨站脚本漏洞

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-6631

No comments yet


Leave a comment