Vulnerability Details : CVE-2016-1661
Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2016-1661
- cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1661
1.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1661
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.3
|
HIGH | AV:N/AC:M/Au:N/C:P/I:P/A:C |
8.6
|
8.5
|
NIST | |
8.0
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
2.1
|
5.9
|
NIST |
CWE ids for CVE-2016-1661
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1661
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
[security-announce] openSUSE-SU-2016:1207-1: important: Security update
-
http://www.ubuntu.com/usn/USN-2960-1
USN-2960-1: Oxide vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
[security-announce] openSUSE-SU-2016:1655-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
[security-announce] openSUSE-SU-2016:1208-1: important: Security update
-
http://www.securityfocus.com/bid/89106
Google Chrome Prior to 50.0.2661.94 Multiple Security Vulnerabilities
-
https://security.gentoo.org/glsa/201605-02
Chromium: Multiple vulnerabilities (GLSA 201605-02) — Gentoo security
-
https://crbug.com/601629
601629 - Security: Read access violation on same-origin, cross-process frames - chromium - Monorail
-
http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
Chrome Releases: Stable Channel Update
-
http://www.debian.org/security/2016/dsa-3564
Debian -- Security Information -- DSA-3564-1 chromium-browser
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
[security-announce] openSUSE-SU-2016:1209-1: important: Security update
-
https://codereview.chromium.org/1887553002/
Issue 1887553002: Make sure binding security checks don't pass if the frame is remote. - Code Review
-
http://rhn.redhat.com/errata/RHSA-2016-0707.html
RHSA-2016:0707 - Security Advisory - Red Hat Customer Portal
Jump to