CVE-2020-16012
Mozilla: Variable time processing of cross-origin images during drawImage calls
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Un filtrado de información de canal lateral en graphics en Google Chrome versiones anteriores a 87.0.4280.66, permitió a un atacante remoto filtrar datos de origen cruzado por medio de una página HTML diseñada
An update that fixes 23 vulnerabilities is now available. This update for chromium fixes the following issues. Use after free in payments. Inappropriate implementation in filesystem. Inappropriate implementation in cryptohome. Race in ImageBurner. Insufficient policy enforcement in networking. Insufficient data validation in WASM. R Use after free in PPAPI. Use after free in WebCodecs. Heap buffer overflow in UI. Heap buffer overflow in clipboard. Use after free in WebRTC. Insufficient policy enforcement in developer tools. R Heap buffer overflow in WebRTC. Inappropriate implementation in PDFium. Insufficient data validation in Blink. Insufficient data validation in Flash. Incorrect security UI in tab preview. Incorrect security UI in sharing. Incorrect security UI in WebUSB. Inappropriate implementation in WebRTC. Insufficient data validation in cros-disks. Side-channel information leakage in graphics. Inappropriate implementation in cookies. This update was imported from the openSUSE:Leap:15.2:Update update project.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-07-27 CVE Reserved
- 2020-11-18 CVE Published
- 2024-03-29 First Exploit
- 2024-08-04 CVE Updated
- 2025-06-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-829: Inclusion of Functionality from Untrusted Control Sphere
CAPEC
References (6)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/aleksejspopovs/cve-2020-16012 | 2024-03-29 | |
https://github.com/helidem/CVE-2020-16012-PoC | 2025-05-15 | |
https://crbug.com/1088224 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html | 2021-01-12 | |
https://access.redhat.com/security/cve/CVE-2020-16012 | 2020-12-01 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1898732 | 2020-12-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 87.0.4280.66 Search vendor "Google" for product "Chrome" and version " < 87.0.4280.66" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | < 83.0 Search vendor "Mozilla" for product "Firefox" and version " < 83.0" | - |
Affected
|