The Buffer::Set function in core/cross/buffer.cc in the O3D plug-in in Google Chrome OS before 26.0.1410.57 does not prevent uninitialized data from remaining in a buffer, which might allow remote attackers to obtain sensitive information via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.chromium.org/gitweb/?p=chromiumos/overlays/chromiumos-overlay.git%3Ba=commit%3Bh=9181705680e1f53fd1e895ebe84c1b7f18c5c380 - | |
References | () http://googlechromereleases.blogspot.com/2013/04/stable-channel-update-for-chrome-os.html - | |
References | () https://code.google.com/p/chromium/issues/detail?id=227197 - |
07 Nov 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () http://googlechromereleases.blogspot.com/2013/04/stable-channel-update-for-chrome-os.html - | |
References | () https://code.google.com/p/chromium/issues/detail?id=227197 - |
Information
Published : 2013-04-16 20:55
Updated : 2024-11-21 01:52
NVD link : CVE-2013-2832
Mitre link : CVE-2013-2832
CVE.ORG link : CVE-2013-2832
JSON object : View
Products Affected
- chrome_os
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer