Lucene search

K
cve[email protected]CVE-2013-2832
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2013-2832

2022-10-0316:15:01
CWE-119
web.nvd.nist.gov
25
cve-2013-2832
buffer::set function
core/cross/buffer.cc
o3d plug-in
google chrome os
uninitialized data
sensitive information
remote attackers
nvd

5.9 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

53.5%

The Buffer::Set function in core/cross/buffer.cc in the O3D plug-in in Google Chrome OS before 26.0.1410.57 does not prevent uninitialized data from remaining in a buffer, which might allow remote attackers to obtain sensitive information via unspecified vectors.

Affected configurations

NVD
Node
googlechrome_osRange26.0.1410.56
OR
googlechrome_osMatch26.0.1410.0
OR
googlechrome_osMatch26.0.1410.1
OR
googlechrome_osMatch26.0.1410.3
OR
googlechrome_osMatch26.0.1410.4
OR
googlechrome_osMatch26.0.1410.5
OR
googlechrome_osMatch26.0.1410.6
OR
googlechrome_osMatch26.0.1410.7
OR
googlechrome_osMatch26.0.1410.8
OR
googlechrome_osMatch26.0.1410.9
OR
googlechrome_osMatch26.0.1410.10
OR
googlechrome_osMatch26.0.1410.11
OR
googlechrome_osMatch26.0.1410.12
OR
googlechrome_osMatch26.0.1410.14
OR
googlechrome_osMatch26.0.1410.15
OR
googlechrome_osMatch26.0.1410.16
OR
googlechrome_osMatch26.0.1410.17
OR
googlechrome_osMatch26.0.1410.18
OR
googlechrome_osMatch26.0.1410.19
OR
googlechrome_osMatch26.0.1410.20
OR
googlechrome_osMatch26.0.1410.21
OR
googlechrome_osMatch26.0.1410.22
OR
googlechrome_osMatch26.0.1410.23
OR
googlechrome_osMatch26.0.1410.24
OR
googlechrome_osMatch26.0.1410.25
OR
googlechrome_osMatch26.0.1410.26
OR
googlechrome_osMatch26.0.1410.27
OR
googlechrome_osMatch26.0.1410.28
OR
googlechrome_osMatch26.0.1410.29
OR
googlechrome_osMatch26.0.1410.30
OR
googlechrome_osMatch26.0.1410.31
OR
googlechrome_osMatch26.0.1410.32
OR
googlechrome_osMatch26.0.1410.33
OR
googlechrome_osMatch26.0.1410.34
OR
googlechrome_osMatch26.0.1410.35
OR
googlechrome_osMatch26.0.1410.36
OR
googlechrome_osMatch26.0.1410.37
OR
googlechrome_osMatch26.0.1410.38
OR
googlechrome_osMatch26.0.1410.39
OR
googlechrome_osMatch26.0.1410.40
OR
googlechrome_osMatch26.0.1410.41
OR
googlechrome_osMatch26.0.1410.42
OR
googlechrome_osMatch26.0.1410.43
OR
googlechrome_osMatch26.0.1410.44
OR
googlechrome_osMatch26.0.1410.45
OR
googlechrome_osMatch26.0.1410.46
OR
googlechrome_osMatch26.0.1410.47
OR
googlechrome_osMatch26.0.1410.48
OR
googlechrome_osMatch26.0.1410.49
OR
googlechrome_osMatch26.0.1410.50
OR
googlechrome_osMatch26.0.1410.51
OR
googlechrome_osMatch26.0.1410.52
OR
googlechrome_osMatch26.0.1410.54
OR
googlechrome_osMatch26.0.1410.55

5.9 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

53.5%