Vulnerability Details : CVE-2016-1646
Public exploit exists!
The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.
Vulnerability category: Denial of service
Products affected by CVE-2016-1646
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
CVE-2016-1646 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Google Chromium V8 Out-of-Bounds Read Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Google Chromium V8 Engine contains an out-of-bounds read vulnerability that allows a remote attacker to cause a denial of service or possibly have another unspecified impact via crafted JavaScript code. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not l
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2016-1646
Added on
2022-06-08
Action due date
2022-06-22
Exploit prediction scoring system (EPSS) score for CVE-2016-1646
66.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1646
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-01-29 |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | 2025-01-28 |
CWE ids for CVE-2016-1646
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2016-1646
-
https://code.google.com/p/chromium/issues/detail?id=594574
594574 - Security: v8 Array.concat OOB access writeup - chromium - MonorailExploit;Issue Tracking;Mailing List
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
[security-announce] openSUSE-SU-2016:0930-1: important: Security updateMailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-0525.html
RHSA-2016:0525 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
[security-announce] openSUSE-SU-2016:1059-1: important: Security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
[security-announce] openSUSE-SU-2016:0929-1: important: Security updateMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/201605-02
Chromium: Multiple vulnerabilities (GLSA 201605-02) — Gentoo securityThird Party Advisory
-
http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
Chrome Releases: Stable Channel UpdateRelease Notes;Vendor Advisory
-
https://codereview.chromium.org/1804963002/
Issue 1804963002: [builtins] Fix Array.prototype.concat bug - Code ReviewPatch
-
http://www.ubuntu.com/usn/USN-2955-1
USN-2955-1: Oxide vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.securitytracker.com/id/1035423
Google Chrome Multiple Flaws Lets Remote Users Execute Arbitrary Code - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
http://www.debian.org/security/2016/dsa-3531
Debian -- Security Information -- DSA-3531-1 chromium-browserMailing List;Third Party Advisory
Jump to