CVE-2014-1703
Use-after-free vulnerability in the WebSocketDispatcherHost::SendOrDrop function in content/browser/renderer_host/websocket_dispatcher_host.cc in the Web Sockets implementation in Google Chrome before 33.0.1750.149 might allow remote attackers to bypass the sandbox protection mechanism by leveraging an incorrect deletion in a certain failure case.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0054 (0.5%)
Percentile: 67.7%
EPSS: 2026-05-06
Affects
google:chromeTechnical description
Use-after-free vulnerability in the WebSocketDispatcherHost::SendOrDrop function in content/browser/renderer_host/websocket_dispatcher_host.cc in the Web Sockets implementation in Google Chrome before 33.0.1750.149 might allow remote attackers to bypass the sandbox protection mechanism by leveraging an incorrect deletion in a certain failure case.
Published: 3/16/2014, 2:06:45 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html
- http://security.gentoo.org/glsa/glsa-201408-16.xml
- http://www.debian.org/security/2014/dsa-2883
- http://www.securitytracker.com/id/1029914
- https://code.google.com/p/chromium/issues/detail?id=338354
- https://src.chromium.org/viewvc/chrome?revision=247627&view=revision
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html