CVE-2014-3152CVE-2014-3152

Affected configuration(s):

cpe:/a:google:chrome:35.0.1916.0
cpe:/a:google:chrome:35.0.1916.1
cpe:/a:google:chrome:35.0.1916.2
cpe:/a:google:chrome:35.0.1916.3
cpe:/a:google:chrome:35.0.1916.4
cpe:/a:google:chrome:35.0.1916.5
cpe:/a:google:chrome:35.0.1916.6
cpe:/a:google:chrome:35.0.1916.7
cpe:/a:google:chrome:35.0.1916.8
cpe:/a:google:chrome:35.0.1916.9
cpe:/a:google:chrome:35.0.1916.10
cpe:/a:google:chrome:35.0.1916.11
cpe:/a:google:chrome:35.0.1916.13
cpe:/a:google:chrome:35.0.1916.14
cpe:/a:google:chrome:35.0.1916.15
cpe:/a:google:chrome:35.0.1916.17
cpe:/a:google:chrome:35.0.1916.18
cpe:/a:google:chrome:35.0.1916.19
cpe:/a:google:chrome:35.0.1916.20
cpe:/a:google:chrome:35.0.1916.21
cpe:/a:google:chrome:35.0.1916.22
cpe:/a:google:chrome:35.0.1916.23
cpe:/a:google:chrome:35.0.1916.27
cpe:/a:google:chrome:35.0.1916.31
cpe:/a:google:chrome:35.0.1916.32
cpe:/a:google:chrome:35.0.1916.33
cpe:/a:google:chrome:35.0.1916.34
cpe:/a:google:chrome:35.0.1916.35
cpe:/a:google:chrome:35.0.1916.36
cpe:/a:google:chrome:35.0.1916.37
cpe:/a:google:chrome:35.0.1916.38
cpe:/a:google:chrome:35.0.1916.39
cpe:/a:google:chrome:35.0.1916.40
cpe:/a:google:chrome:35.0.1916.41
cpe:/a:google:chrome:35.0.1916.42
cpe:/a:google:chrome:35.0.1916.43
cpe:/a:google:chrome:35.0.1916.44
cpe:/a:google:chrome:35.0.1916.45
cpe:/a:google:chrome:35.0.1916.46
cpe:/a:google:chrome:35.0.1916.47
cpe:/a:google:chrome:35.0.1916.48
cpe:/a:google:chrome:35.0.1916.49
cpe:/a:google:chrome:35.0.1916.51
cpe:/a:google:chrome:35.0.1916.52
cpe:/a:google:chrome:35.0.1916.54
cpe:/a:google:chrome:35.0.1916.56
cpe:/a:google:chrome:35.0.1916.57
cpe:/a:google:chrome:35.0.1916.59
cpe:/a:google:chrome:35.0.1916.61
cpe:/a:google:chrome:35.0.1916.68
cpe:/a:google:chrome:35.0.1916.69
cpe:/a:google:chrome:35.0.1916.71
cpe:/a:google:chrome:35.0.1916.72
cpe:/a:google:chrome:35.0.1916.74
cpe:/a:google:chrome:35.0.1916.77
cpe:/a:google:chrome:35.0.1916.80
cpe:/a:google:chrome:35.0.1916.82
cpe:/a:google:chrome:35.0.1916.84
cpe:/a:google:chrome:35.0.1916.85
cpe:/a:google:chrome:35.0.1916.86
cpe:/a:google:chrome:35.0.1916.88
cpe:/a:google:chrome:35.0.1916.90
cpe:/a:google:chrome:35.0.1916.92
cpe:/a:google:chrome:35.0.1916.93
cpe:/a:google:chrome:35.0.1916.95
cpe:/a:google:chrome:35.0.1916.96
cpe:/a:google:chrome:35.0.1916.98
cpe:/a:google:chrome:35.0.1916.99
cpe:/a:google:chrome:35.0.1916.101
cpe:/a:google:chrome:35.0.1916.103
cpe:/a:google:chrome:35.0.1916.104
cpe:/a:google:chrome:35.0.1916.105
cpe:/a:google:chrome:35.0.1916.106
cpe:/a:google:chrome:35.0.1916.107
cpe:/a:google:chrome:35.0.1916.108
cpe:/a:google:chrome:35.0.1916.109
cpe:/a:google:chrome:35.0.1916.110
cpe:/a:google:chrome:35.0.1916.111
cpe:/a:google:chrome:35.0.1916.112
cpe:/a:google:chrome:35.0.1916.113
cpe:/a:google:v8:3.25.0
cpe:/a:google:v8:3.25.1
cpe:/a:google:v8:3.25.2
cpe:/a:google:v8:3.25.3
cpe:/a:google:v8:3.25.4
cpe:/a:google:v8:3.25.5
cpe:/a:google:v8:3.25.6
cpe:/a:google:v8:3.25.7
cpe:/a:google:v8:3.25.8
cpe:/a:google:v8:3.25.9
cpe:/a:google:v8:3.25.10
cpe:/a:google:v8:3.25.11
cpe:/a:google:v8:3.25.12
cpe:/a:google:v8:3.25.13
cpe:/a:google:v8:3.25.14
cpe:/a:google:v8:3.25.15
cpe:/a:google:v8:3.25.16
cpe:/a:google:v8:3.25.17
cpe:/a:google:v8:3.25.18
cpe:/a:google:v8:3.25.19
cpe:/a:google:v8:3.25.20
cpe:/a:google:v8:3.25.21
cpe:/a:google:v8:3.25.22
cpe:/a:google:v8:3.25.23
cpe:/a:google:v8:3.25.24
cpe:/a:google:v8:3.25.25
cpe:/a:google:v8:3.25.26
cpe:/a:google:v8:3.25.27
cpe:/a:google:v8:3.25.28
cpe:/o:fedoraproject:fedora:20
cpe:/o:fedoraproject:fedora:21
cpe:/o:fedoraproject:fedora:22

Date published: 2014-05-21T07:14:09.990-04:00

Date last modified: 2017-01-06T21:59:53.893-05:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html

Summary: Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.