Google V8 up to 3.20.8 Polymorphic Array hydrogen.cc HandlePolymorphicElementAccess Local Privilege Escalation
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.8 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in Google V8 up to 3.20.8. Affected by this vulnerability is the function HOptimizedGraphBuilder::HandlePolymorphicElementAccess of the file hydrogen.cc of the component Polymorphic Array Handler. Such manipulation leads to an unknown weakness.
Moreover, an exploit is present.
Upgrading the affected component is recommended.
Details
A vulnerability, which was classified as problematic, has been found in Google V8 up to 3.20.8. Affected by this issue is the function HOptimizedGraphBuilder::HandlePolymorphicElementAccess of the file hydrogen.cc of the component Polymorphic Array Handler. The impact remains unknown.
The weakness was disclosed 07/26/2013 as 263276 as confirmed advisory (Website). The advisory is shared for download at code.google.com. Technical details as well as a public exploit are known.
It is declared as proof-of-concept. As 0-day the estimated underground price was around $25k-$100k.
Upgrading to version 3.20.9 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at code.google.com. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the vulnerability database at OSVDB (95822†). Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.google.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.3
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Local Privilege EscalationCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: V8 3.20.9
Patch: code.google.com
Timeline
07/26/2013 🔍07/26/2013 🔍
08/02/2013 🔍
08/02/2013 🔍
Sources
Vendor: google.comAdvisory: 263276
Status: Confirmed
GCVE (VulDB): GCVE-100-9812
OSVDB: 95822
Entry
Created: 08/02/2013 10:38Changes: 08/02/2013 10:38 (46)
Complete: 🔍
Committer: olku
Cache ID: 216:13A:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.