// For flags

CVE-2020-16012

Mozilla: Variable time processing of cross-origin images during drawImage calls

Severity Score

4.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

Un filtrado de información de canal lateral en graphics en Google Chrome versiones anteriores a 87.0.4280.66, permitió a un atacante remoto filtrar datos de origen cruzado por medio de una página HTML diseñada

An update that fixes 23 vulnerabilities is now available. This update for chromium fixes the following issues. Use after free in payments. Inappropriate implementation in filesystem. Inappropriate implementation in cryptohome. Race in ImageBurner. Insufficient policy enforcement in networking. Insufficient data validation in WASM. R Use after free in PPAPI. Use after free in WebCodecs. Heap buffer overflow in UI. Heap buffer overflow in clipboard. Use after free in WebRTC. Insufficient policy enforcement in developer tools. R Heap buffer overflow in WebRTC. Inappropriate implementation in PDFium. Insufficient data validation in Blink. Insufficient data validation in Flash. Incorrect security UI in tab preview. Incorrect security UI in sharing. Incorrect security UI in WebUSB. Inappropriate implementation in WebRTC. Insufficient data validation in cros-disks. Side-channel information leakage in graphics. Inappropriate implementation in cookies. This update was imported from the openSUSE:Leap:15.2:Update update project.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-07-27 CVE Reserved
  • 2020-11-18 CVE Published
  • 2024-03-29 First Exploit
  • 2024-08-04 CVE Updated
  • 2025-06-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-829: Inclusion of Functionality from Untrusted Control Sphere
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Google
Search vendor "Google"
Chrome
Search vendor "Google" for product "Chrome"
< 87.0.4280.66
Search vendor "Google" for product "Chrome" and version " < 87.0.4280.66"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
< 83.0
Search vendor "Mozilla" for product "Firefox" and version " < 83.0"
-
Affected