Vulnerability Details : CVE-2016-1686
The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2016-1686
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1686
2.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1686
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2016-1686
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1686
-
https://security.gentoo.org/glsa/201607-07
Chromium: Multiple vulnerabilities (GLSA 201607-07) — Gentoo security
-
http://www.securityfocus.com/bid/90876
Google Chrome Prior to 51.0.2704.63 Multiple Security Vulnerabilities
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
[security-announce] openSUSE-SU-2016:1496-1: important: Security updateThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
[security-announce] openSUSE-SU-2016:1430-1: important: Security updateThird Party Advisory
-
http://www.securitytracker.com/id/1035981
Google Chrome Multiple Flaws Lets Remote Users Bypass Same-Origin Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code - SecurityTrackerThird Party Advisory
-
https://crbug.com/603518
603518 - Security: PDFium Out-of-Bounds Read in CPDF_DeviceCS::TranslateImageLine - chromium - MonorailPermissions Required
-
https://access.redhat.com/errata/RHSA-2016:1190
RHSA-2016:1190 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://codereview.chromium.org/1892143003
Issue 1892143003: Prevent a potential OOB read in TranslateImageLine. - Code ReviewIssue Tracking
-
http://www.debian.org/security/2016/dsa-3590
Debian -- Security Information -- DSA-3590-1 chromium-browserThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
[security-announce] openSUSE-SU-2016:1433-1: important: Security updateThird Party Advisory
-
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
Chrome Releases: Stable Channel UpdateVendor Advisory
Jump to