CVE-2016-1661 Details

CVE-2016-1661

Published: 2016-05-14
Last Modified: 2018-10-30
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.3/10
Exploit Score 8.6/10
Access Vector Network
Access Complexity Medium
Authentication None
Impact Score 8.5/10
Confidentiality Impact Partial
Availability Impact Complete
Integrity Impact Partial
Vector String AV:N/AC:M/Au:N/C:P/I:P/A:C
Common Vulnerability Score System v3.1
Severity High
Base Score 8/10
Exploit Score 2.1/10
Access Vector Network
Access Complexity Low
Privileges Required Low
Impact Score 5.9/10
Confidentiality Impact High
Availability Impact High
Integrity Impact High
Scope Unchanged
User Interaction Required
Vector String CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* Yes - -
References

http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
http://rhn.redhat.com/errata/RHSA-2016-0707.html
http://www.debian.org/security/2016/dsa-3564
http://www.securityfocus.com/bid/89106
http://www.ubuntu.com/usn/USN-2960-1
https://codereview.chromium.org/1887553002/
https://crbug.com/601629
https://security.gentoo.org/glsa/201605-02

CVE ID
CVE-2016-1661
Published
2016-05-14
Modified
2018-10-30
CVSSv2.0
High
CVSSv3.1
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-20

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.