Vulnerability Name: | CVE-2010-4493 (CCN-63656) | ||||||||||||||||||||
Assigned: | 2010-12-02 | ||||||||||||||||||||
Published: | 2010-12-02 | ||||||||||||||||||||
Updated: | 2020-07-28 | ||||||||||||||||||||
Summary: | Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service via vectors related to the handling of mouse dragging events. | ||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: CONFIRM Type: Exploit, Vendor Advisory http://code.google.com/p/chromium/issues/detail?id=63051 Source: MITRE Type: CNA CVE-2010-4493 Source: CCN Type: Google Chrome Releases Web site Stable, Beta Channel Updates Source: CONFIRM Type: Vendor Advisory http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html Source: CCN Type: DSA 2188-1 webkit security update Source: SUSE Type: Mailing List, Third Party Advisory SUSE-SR:2011:009 Source: CCN Type: SA42472 Google Chrome Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory 42472 Source: CCN Type: SA43688 Debian webkit Multiple Vulnerabilities Source: DEBIAN Type: Third Party Advisory DSA-2188 Source: DEBIAN Type: DSA-2188 webkit -- several vulnerabilities Source: CCN Type: OSVDB ID: 69672 Google Chrome Mouse Drag Event Use-after-free Remote DoS Source: CCN Type: BID-45170 Google Chrome prior to 8.0.552.215 Multiple Security Vulnerabilities Source: XF Type: UNKNOWN chrome-mouse-dragging-dos(63656) Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:12129 Source: SUSE Type: SUSE-SR:2011:009 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |