Vulnerability Details : CVE-2016-5218
The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to temporarily spoof the contents of the Omnibox (URL bar) via a crafted HTML page containing PDF data.
Vulnerability category: Input validation
Products affected by CVE-2016-5218
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-5218
0.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-5218
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2016-5218
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-5218
-
http://www.securityfocus.com/bid/94633
Google Chrome Prior to 55.0.2883.75 Multiple Security Vulnerabilities
-
http://rhn.redhat.com/errata/RHSA-2016-2919.html
RHSA-2016:2919 - Security Advisory - Red Hat Customer Portal
-
https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html
Chrome Releases: Stable Channel Update for Desktop
-
https://security.gentoo.org/glsa/201612-11
Chromium: Multiple vulnerabilities (GLSA 201612-11) — Gentoo security
-
https://crbug.com/660498
660498 - Security: Temporary addressbar spoof with PDF navigation to sites with long response time - chromium - Monorail
Jump to