Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
Advisories
Source ID Title
EUVD EUVD EUVD-2013-6433 Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T17:46:22.338Z

Reserved: 2013-11-05T00:00:00

Link: CVE-2013-6631

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-11-19T04:50:56.297

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-6631

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses