Vulnerability Details : CVE-2016-5133
Google Chrome before 52.0.2743.82 mishandles origin information during proxy authentication, which allows man-in-the-middle attackers to spoof a proxy-authentication login prompt or trigger incorrect credential storage by modifying the client-server data stream.
Vulnerability category: BypassGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2016-5133
Probability of exploitation activity in the next 30 days: 0.37%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 70 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-5133
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N |
1.6
|
3.6
|
NIST |
CWE ids for CVE-2016-5133
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-5133
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
[security-announce] openSUSE-SU-2016:1868-1: important: Security update
-
http://www.ubuntu.com/usn/USN-3041-1
USN-3041-1: Oxide vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
[security-announce] openSUSE-SU-2016:1869-1: important: Security update
-
http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
http://www.debian.org/security/2016/dsa-3637
Debian -- Security Information -- DSA-3637-1 chromium-browser
-
http://www.securityfocus.com/bid/92053
Google Chrome Prior to 52.0.2743.82 Multiple Security Vulnerabilities
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
[security-announce] openSUSE-SU-2016:1865-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
[security-announce] openSUSE-SU-2016:1918-1: important: Security update
-
https://codereview.chromium.org/2067933002/
Issue 2067933002: Use correct origin when prompting for proxy authentication. - Code ReviewIssue Tracking
-
http://rhn.redhat.com/errata/RHSA-2016-1485.html
RHSA-2016:1485 - Security Advisory - Red Hat Customer Portal
-
https://crbug.com/613626
613626 - Credential Phishing via Transparent Authenticating Proxy Vector - chromium - MonorailPermissions Required
-
https://security.gentoo.org/glsa/201610-09
Chromium: Multiple vulnerabilities (GLSA 201610-09) — Gentoo security
-
http://www.securitytracker.com/id/1036428
Google Chrome Multiple Flaws Lets Remote Users Bypass Same-Origin Restrictions, Obtain Potentially Sensitive Information, Spoof URLs, and Execute Arbitrary Code - SecurityTracker
Products affected by CVE-2016-5133
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*