Vulnerability Details : CVE-2012-2864
Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2012-2864
Probability of exploitation activity in the next 30 days: 5.37%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-2864
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2012-2864
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2864
-
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0264
Support/Advisories/MGASA-2012-0264 - Mageia wiki
-
http://www.ubuntu.com/usn/USN-1623-1
USN-1623-1: Mesa vulnerability | Ubuntu security notices
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:103
mandriva.com
-
http://googlechromereleases.blogspot.com/2012/08/stable-channel-update-for-chrome-os.html
Chrome Releases: Stable Channel Update for Chrome OS
-
http://code.google.com/p/chromium/issues/detail?id=141901
141901 - Security: mesa stack scribbling thingamadoo - chromium - Monorail
Products affected by CVE-2012-2864
- cpe:2.3:o:google:chrome_os:21.0.1180.31:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.18:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.39:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.38:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.11:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.10:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.36:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.17:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.49:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.37:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.3:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.13:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.14:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.50:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.79:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.33:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.32:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.46:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.41:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.6:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.0:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.8:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.9:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.35:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.34:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.48:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.47:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.4:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.5:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.15:*:*:*:*:*:*:*
- cpe:2.3:o:google:chrome_os:21.0.1180.7:*:*:*:*:*:*:*