Executive Summary
Summary | |
---|---|
Title | chromium-browser security update |
Informations | |||
---|---|---|---|
Name | RHSA-2016:1190 | First vendor Publication | 2016-06-01 |
Vendor | RedHat | Last vendor Modification | 2016-06-01 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 51.0.2704.63. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1672, CVE-2016-1673, CVE-2016-1674, CVE-2016-1675, CVE-2016-1676, CVE-2016-1678, CVE-2016-1679, CVE-2016-1680, CVE-2016-1681, CVE-2016-1695, CVE-2016-1677, CVE-2016-1682, CVE-2016-1683, CVE-2016-1684, CVE-2016-1685, CVE-2016-1686, CVE-2016-1687, CVE-2016-1688, CVE-2016-1689, CVE-2016-1690, CVE-2016-1691, CVE-2016-1692, CVE-2016-1693, CVE-2016-1694) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1340005 - CVE-2016-1672 chromium-browser: cross-origin bypass in extension bindings 1340006 - CVE-2016-1673 chromium-browser: cross-origin bypass in blink 1340007 - CVE-2016-1674 chromium-browser: cross-origin bypass in extensions 1340008 - CVE-2016-1675 chromium-browser: cross-origin bypass in blink 1340009 - CVE-2016-1676 chromium-browser: cross-origin bypass in extension bindings 1340010 - CVE-2016-1677 chromium-browser: type confusion in v8 1340011 - CVE-2016-1678 chromium-browser: heap overflow in v8 1340012 - CVE-2016-1679 chromium-browser: heap use-after-free in v8 bindings 1340013 - CVE-2016-1680 chromium-browser: heap use-after-free in skia 1340014 - CVE-2016-1681 chromium-browser: heap overflow in pdfium 1340015 - CVE-2016-1682 chromium-browser: csp bypass for serviceworker 1340016 - CVE-2016-1683 chromium-browser: out-of-bounds access in libxslt 1340017 - CVE-2016-1684 chromium-browser: integer overflow in libxslt 1340018 - CVE-2016-1685 chromium-browser: out-of-bounds read in pdfium 1340019 - CVE-2016-1686 chromium-browser: out-of-bounds read in pdfium 1340021 - CVE-2016-1687 chromium-browser: information leak in extensions 1340022 - CVE-2016-1688 chromium-browser: out-of-bounds read in v8 1340023 - CVE-2016-1689 chromium-browser: heap buffer overflow in media 1340024 - CVE-2016-1690 chromium-browser: heap use-after-free in autofill 1340026 - CVE-2016-1691 chromium-browser: heap buffer-overflow in skia 1340027 - CVE-2016-1692 chromium-browser: limited cross-origin bypass in serviceworker 1340028 - CVE-2016-1693 chromium-browser: http download of software removal tool 1340029 - CVE-2016-1694 chromium-browser: hpkp pins removed on cache clearance 1340030 - CVE-2016-1695 chromium-browser: various fixes from internal audits |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2016-1190.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
45 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
35 % | CWE-284 | Access Control (Authorization) Issues |
10 % | CWE-254 | Security Features |
10 % | CWE-200 | Information Exposure |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-06-09 | Google Chrome PDFium jpeg2000 SIZ segment check failure heap buffer overflow ... RuleID : 39162 - Revision : 4 - Type : FILE-PDF |
2016-06-09 | Google Chrome PDFium jpeg2000 SIZ segment check failure heap buffer overflow ... RuleID : 39161 - Revision : 4 - Type : FILE-PDF |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-28 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3271-1.nasl - Type : ACT_GATHER_INFO |
2016-07-21 | Name : The remote host is missing a Mac OS X update that fixes multiple vulnerabilit... File : macosx_SecUpd2016-004.nasl - Type : ACT_GATHER_INFO |
2016-07-21 | Name : The remote host is missing a Mac OS X security update that fixes multiple vul... File : macosx_10_11_6.nasl - Type : ACT_GATHER_INFO |
2016-07-21 | Name : The remote device is affected by multiple vulnerabilities. File : appletv_9_2_2.nasl - Type : ACT_GATHER_INFO |
2016-07-19 | Name : The remote host is running an application that is affected by multiple vulner... File : itunes_12_4_2_banner.nasl - Type : ACT_GATHER_INFO |
2016-07-19 | Name : The remote host contains an application that is affected by multiple vulnerab... File : itunes_12_4_2.nasl - Type : ACT_GATHER_INFO |
2016-07-18 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201607-07.nasl - Type : ACT_GATHER_INFO |
2016-06-21 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_1a2aa04f371811e6b3c814dae9d210b8.nasl - Type : ACT_GATHER_INFO |
2016-06-20 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3605.nasl - Type : ACT_GATHER_INFO |
2016-06-14 | Name : The remote Debian host is missing a security update. File : debian_DLA-514.nasl - Type : ACT_GATHER_INFO |
2016-06-07 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2992-1.nasl - Type : ACT_GATHER_INFO |
2016-06-07 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_c039a7612c2911e689123065ec8fd3ec.nasl - Type : ACT_GATHER_INFO |
2016-06-06 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-682.nasl - Type : ACT_GATHER_INFO |
2016-06-02 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-1190.nasl - Type : ACT_GATHER_INFO |
2016-06-02 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3590.nasl - Type : ACT_GATHER_INFO |
2016-06-01 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-652.nasl - Type : ACT_GATHER_INFO |
2016-05-31 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_1a6bbb9524b811e6bd313065ec8fd3ec.nasl - Type : ACT_GATHER_INFO |
2016-05-27 | Name : A web browser installed on the remote Windows host is affected by multiple vu... File : google_chrome_51_0_2704_63.nasl - Type : ACT_GATHER_INFO |
2016-05-27 | Name : A web browser installed on the remote Mac OS X host is affected by multiple v... File : macosx_google_chrome_51_0_2704_63.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-06-06 17:36:05 |
|
2016-06-06 05:38:06 |
|
2016-06-03 13:27:14 |
|
2016-06-01 13:25:10 |
|