First published: Wed Jul 31 2013(Updated: )
Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <=28.0.1500.94 | |
Google Chrome | =28.0.1500.0 | |
Google Chrome | =28.0.1500.2 | |
Google Chrome | =28.0.1500.3 | |
Google Chrome | =28.0.1500.4 | |
Google Chrome | =28.0.1500.5 | |
Google Chrome | =28.0.1500.6 | |
Google Chrome | =28.0.1500.8 | |
Google Chrome | =28.0.1500.9 | |
Google Chrome | =28.0.1500.10 | |
Google Chrome | =28.0.1500.11 | |
Google Chrome | =28.0.1500.12 | |
Google Chrome | =28.0.1500.13 | |
Google Chrome | =28.0.1500.14 | |
Google Chrome | =28.0.1500.15 | |
Google Chrome | =28.0.1500.16 | |
Google Chrome | =28.0.1500.17 | |
Google Chrome | =28.0.1500.18 | |
Google Chrome | =28.0.1500.19 | |
Google Chrome | =28.0.1500.20 | |
Google Chrome | =28.0.1500.21 | |
Google Chrome | =28.0.1500.22 | |
Google Chrome | =28.0.1500.23 | |
Google Chrome | =28.0.1500.24 | |
Google Chrome | =28.0.1500.25 | |
Google Chrome | =28.0.1500.26 | |
Google Chrome | =28.0.1500.27 | |
Google Chrome | =28.0.1500.28 | |
Google Chrome | =28.0.1500.29 | |
Google Chrome | =28.0.1500.31 | |
Google Chrome | =28.0.1500.32 | |
Google Chrome | =28.0.1500.33 | |
Google Chrome | =28.0.1500.34 | |
Google Chrome | =28.0.1500.35 | |
Google Chrome | =28.0.1500.36 | |
Google Chrome | =28.0.1500.37 | |
Google Chrome | =28.0.1500.38 | |
Google Chrome | =28.0.1500.39 | |
Google Chrome | =28.0.1500.40 | |
Google Chrome | =28.0.1500.41 | |
Google Chrome | =28.0.1500.42 | |
Google Chrome | =28.0.1500.43 | |
Google Chrome | =28.0.1500.44 | |
Google Chrome | =28.0.1500.45 | |
Google Chrome | =28.0.1500.46 | |
Google Chrome | =28.0.1500.47 | |
Google Chrome | =28.0.1500.48 | |
Google Chrome | =28.0.1500.49 | |
Google Chrome | =28.0.1500.50 | |
Google Chrome | =28.0.1500.51 | |
Google Chrome | =28.0.1500.52 | |
Google Chrome | =28.0.1500.53 | |
Google Chrome | =28.0.1500.54 | |
Google Chrome | =28.0.1500.56 | |
Google Chrome | =28.0.1500.58 | |
Google Chrome | =28.0.1500.59 | |
Google Chrome | =28.0.1500.60 | |
Google Chrome | =28.0.1500.61 | |
Google Chrome | =28.0.1500.62 | |
Google Chrome | =28.0.1500.63 | |
Google Chrome | =28.0.1500.64 | |
Google Chrome | =28.0.1500.66 | |
Google Chrome | =28.0.1500.68 | |
Google Chrome | =28.0.1500.70 | |
Google Chrome | =28.0.1500.71 | |
Google Chrome | =28.0.1500.72 | |
Google Chrome | =28.0.1500.89 | |
Google Chrome | =28.0.1500.91 | |
Google Chrome | =28.0.1500.93 | |
Red Hat OpenStack for IBM Power | =3.0 | |
Debian Linux | =7.0 | |
Node.js | >=0.10.0<0.10.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2882 has been classified as a high severity vulnerability due to its potential to cause denial of service and impact system stability.
To fix CVE-2013-2882, users should upgrade Google Chrome to version 28.0.1500.95 or later.
CVE-2013-2882 affects Google Chrome versions before 28.0.1500.95 as well as some versions of Node.js and OpenStack.
CVE-2013-2882 can enable remote attackers to execute denial of service attacks by exploiting type confusion.
There is no public information confirming active exploitation of CVE-2013-2882, but the nature of the vulnerability allows for potential attacks.