Vulnerability Details : CVE-2012-2834
Integer overflow in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted data in the Matroska container format.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2012-2834
Probability of exploitation activity in the next 30 days: 0.48%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 72 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-2834
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2012-2834
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2834
-
http://code.google.com/p/chromium/issues/detail?id=132779
132779 - Security: WebM heap-buffer-overflow in matroskadec.c:matroska_parse_block() - chromium - Monorail
-
http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
https://hermes.opensuse.org/messages/15075728
openSUSE.org - 503
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15444
Repository / Oval Repository
Products affected by CVE-2012-2834
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.17:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.6:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.9:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.21:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.29:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.40:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.39:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.18:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.19:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.14:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.7:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.4:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.22:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.23:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.30:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.31:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.15:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.12:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.13:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.5:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.10:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.24:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.3:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.25:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.26:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.36:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.35:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.32:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.38:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.37:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.41:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.20:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.16:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.11:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.8:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.2:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.1:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.27:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.28:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.34:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:20.0.1132.33:*:*:*:*:*:*:*