Vulnerability Description
The Buffer::Set function in core/cross/buffer.cc in the O3D plug-in in Google Chrome OS before 26.0.1410.57 does not prevent uninitialized data from remaining in a buffer, which might allow remote attackers to obtain sensitive information via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome Os | <= 26.0.1410.56 |
Related Weaknesses (CWE)
References
- http://git.chromium.org/gitweb/?p=chromiumos/overlays/chromiumos-overlay.git%3Ba
- http://googlechromereleases.blogspot.com/2013/04/stable-channel-update-for-chrom
- https://code.google.com/p/chromium/issues/detail?id=227197
- http://git.chromium.org/gitweb/?p=chromiumos/overlays/chromiumos-overlay.git%3Ba
- http://googlechromereleases.blogspot.com/2013/04/stable-channel-update-for-chrom
- https://code.google.com/p/chromium/issues/detail?id=227197
FAQ
What is CVE-2013-2832?
CVE-2013-2832 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The Buffer::Set function in core/cross/buffer.cc in the O3D plug-in in Google Chrome OS before 26.0.1410.57 does not prevent uninitialized data from remaining in a buffer, which might allow remote att...
How severe is CVE-2013-2832?
CVE-2013-2832 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2832?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome Os.