Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title chromium-browser security update
Informations
Name RHSA-2016:1854 First vendor Publication 2016-09-12
Vendor RedHat Last vendor Modification 2016-09-12
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64

3. Description:

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 53.0.2785.89.

Security Fix(es):

* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-5147, CVE-2016-5148, CVE-2016-5149, CVE-2016-5150, CVE-2016-5151, CVE-2016-5152, CVE-2016-5153, CVE-2016-5154, CVE-2016-5155, CVE-2016-5156, CVE-2016-5157, CVE-2016-5158, CVE-2016-5159, CVE-2016-5167, CVE-2016-5161, CVE-2016-5162, CVE-2016-5163, CVE-2016-5164, CVE-2016-5165, CVE-2016-5166, CVE-2016-5160)

4. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, Chromium must be restarted for the changes to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1372207 - CVE-2016-5147 chromium-browser: universal xss in blink 1372208 - CVE-2016-5148 chromium-browser: universal xss in blink 1372209 - CVE-2016-5149 chromium-browser: script injection in extensions 1372210 - CVE-2016-5150 chromium-browser: use after free in blink 1372212 - CVE-2016-5151 chromium-browser: use after free in pdfium 1372213 - CVE-2016-5152 chromium-browser: heap overflow in pdfium 1372214 - CVE-2016-5153 chromium-browser: use after destruction in blink 1372215 - CVE-2016-5154 chromium-browser: heap overflow in pdfium 1372216 - CVE-2016-5155 chromium-browser: address bar spoofing 1372217 - CVE-2016-5156 chromium-browser: use after free in event bindings 1372218 - CVE-2016-5157 chromium-browser: heap overflow in pdfium 1372219 - CVE-2016-5158 chromium-browser: heap overflow in pdfium 1372220 - CVE-2016-5159 chromium-browser: heap overflow in pdfium 1372221 - CVE-2016-5161 chromium-browser: type confusion in blink 1372222 - CVE-2016-5162 chromium-browser: extensions web accessible resources bypass 1372223 - CVE-2016-5163 chromium-browser: address bar spoofing 1372224 - CVE-2016-5164 chromium-browser: universal xss using devtools 1372225 - CVE-2016-5165 chromium-browser: script injection in devtools 1372227 - CVE-2016-5166 chromium-browser: smb relay attack via save page as 1372228 - CVE-2016-5160 chromium-browser: extensions web accessible resources bypass 1372229 - CVE-2016-5167 chromium-browser: various fixes from internal audits

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2016-1854.html

CWE : Common Weakness Enumeration

% Id Name
20 % CWE-254 Security Features
20 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
15 % CWE-416 Use After Free
15 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)
10 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
5 % CWE-704 Incorrect Type Conversion or Cast
5 % CWE-200 Information Exposure
5 % CWE-94 Failure to Control Generation of Code ('Code Injection')
5 % CWE-19 Data Handling

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3952
Os 3
Os 3
Os 1

Nessus® Vulnerability Scanner

Date Description
2017-11-02 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4013.nasl - Type : ACT_GATHER_INFO
2017-08-14 Name : The remote Fedora host is missing a security update.
File : fedora_2017-920b27e8f4.nasl - Type : ACT_GATHER_INFO
2017-07-24 Name : The remote Fedora host is missing a security update.
File : fedora_2017-98bed96d12.nasl - Type : ACT_GATHER_INFO
2017-07-13 Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZLSA-2017-0838.nasl - Type : ACT_GATHER_INFO
2017-07-13 Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZLSA-2017-0559.nasl - Type : ACT_GATHER_INFO
2017-06-09 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1088.nasl - Type : ACT_GATHER_INFO
2017-05-01 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1060.nasl - Type : ACT_GATHER_INFO
2017-03-30 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2017-0838.nasl - Type : ACT_GATHER_INFO
2017-03-24 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20170322_openjpeg_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2017-03-23 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-0838.nasl - Type : ACT_GATHER_INFO
2017-03-23 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2017-0048.nasl - Type : ACT_GATHER_INFO
2017-03-23 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2017-0838.nasl - Type : ACT_GATHER_INFO
2017-03-23 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2017-807.nasl - Type : ACT_GATHER_INFO
2017-03-21 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20170319_openjpeg_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2017-03-21 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2017-0559.nasl - Type : ACT_GATHER_INFO
2017-03-20 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-0559.nasl - Type : ACT_GATHER_INFO
2017-03-20 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2017-0559.nasl - Type : ACT_GATHER_INFO
2017-01-23 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3768.nasl - Type : ACT_GATHER_INFO
2016-11-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-eec838a3a0.nasl - Type : ACT_GATHER_INFO
2016-11-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-dc53ceffc2.nasl - Type : ACT_GATHER_INFO
2016-11-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-8ed6b7bb5e.nasl - Type : ACT_GATHER_INFO
2016-10-31 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201610-09.nasl - Type : ACT_GATHER_INFO
2016-10-13 Name : The remote Fedora host is missing a security update.
File : fedora_2016-2e50862950.nasl - Type : ACT_GATHER_INFO
2016-10-12 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_b7d56d0b7a1111e6af78589cfc0654e1.nasl - Type : ACT_GATHER_INFO
2016-09-19 Name : The remote Fedora host is missing a security update.
File : fedora_2016-adb346980c.nasl - Type : ACT_GATHER_INFO
2016-09-19 Name : The remote Fedora host is missing a security update.
File : fedora_2016-2eac99579c.nasl - Type : ACT_GATHER_INFO
2016-09-19 Name : The remote Fedora host is missing a security update.
File : fedora_2016-231f53426b.nasl - Type : ACT_GATHER_INFO
2016-09-15 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-3058-1.nasl - Type : ACT_GATHER_INFO
2016-09-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-27d3b7742f.nasl - Type : ACT_GATHER_INFO
2016-09-15 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_769ba44979e111e6bf753065ec8fd3ec.nasl - Type : ACT_GATHER_INFO
2016-09-15 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1080.nasl - Type : ACT_GATHER_INFO
2016-09-13 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2016-1854.nasl - Type : ACT_GATHER_INFO
2016-09-12 Name : The remote Fedora host is missing a security update.
File : fedora_2016-bf8c64a060.nasl - Type : ACT_GATHER_INFO
2016-09-09 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-2250.nasl - Type : ACT_GATHER_INFO
2016-09-06 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3660.nasl - Type : ACT_GATHER_INFO
2016-09-02 Name : A web browser installed on the remote Windows host is affected by multiple vu...
File : google_chrome_53_0_2785_89.nasl - Type : ACT_GATHER_INFO
2016-09-02 Name : A web browser installed on the remote Mac OS X host is affected by multiple v...
File : macosx_google_chrome_53_0_2785_89.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2016-09-14 13:25:41
  • Multiple Updates
2016-09-13 00:29:21
  • First insertion