Executive Summary
Summary | |
---|---|
Title | chromium-browser security update |
Informations | |||
---|---|---|---|
Name | RHSA-2016:2067 | First vendor Publication | 2016-10-17 |
Vendor | RedHat | Last vendor Modification | 2016-10-17 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 54.0.2840.59. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-5181, CVE-2016-5182, CVE-2016-5183, CVE-2016-5184, CVE-2016-5185, CVE-2016-5187, CVE-2016-5194, CVE-2016-5186, CVE-2016-5188, CVE-2016-5189, CVE-2016-5190, CVE-2016-5191, CVE-2016-5192, CVE-2016-5193) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1384347 - CVE-2016-5181 chromium-browser: universal xss in blink 1384348 - CVE-2016-5182 chromium-browser: heap overflow in blink 1384349 - CVE-2016-5183 chromium-browser: use after free in pdfium 1384350 - CVE-2016-5184 chromium-browser: use after free in pdfium 1384352 - CVE-2016-5185 chromium-browser: use after free in blink 1384354 - CVE-2016-5187 chromium-browser: url spoofing 1384355 - CVE-2016-5188 chromium-browser: ui spoofing 1384357 - CVE-2016-5192 chromium-browser: cross-origin bypass in blink 1384358 - CVE-2016-5189 chromium-browser: url spoofing 1384360 - CVE-2016-5186 chromium-browser: out of bounds read in devtools 1384361 - CVE-2016-5191 chromium-browser: universal xss in bookmarks 1384362 - CVE-2016-5190 chromium-browser: use after free in internals 1384364 - CVE-2016-5193 chromium-browser: scheme bypass 1384365 - CVE-2016-5194 chromium-browser: various fixes from internal audits |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2016-2067.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
31 % | CWE-416 | Use After Free |
23 % | CWE-20 | Improper Input Validation |
15 % | CWE-284 | Access Control (Authorization) Issues |
15 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
8 % | CWE-125 | Out-of-bounds Read |
8 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2018-03-29 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 45767 - Revision : 1 - Type : BROWSER-CHROME |
2018-03-29 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 45766 - Revision : 1 - Type : BROWSER-CHROME |
2018-03-29 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 45765 - Revision : 1 - Type : BROWSER-CHROME |
2018-03-29 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 45764 - Revision : 1 - Type : BROWSER-CHROME |
2018-03-29 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 45763 - Revision : 1 - Type : BROWSER-CHROME |
2018-03-29 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 45762 - Revision : 1 - Type : BROWSER-CHROME |
2018-03-29 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 45761 - Revision : 1 - Type : BROWSER-CHROME |
2018-03-29 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 45760 - Revision : 1 - Type : BROWSER-CHROME |
2017-07-06 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 43118 - Revision : 1 - Type : BROWSER-CHROME |
2017-07-06 | Google Chrome Blink ImageBitmap integer overflow attempt RuleID : 43117 - Revision : 1 - Type : BROWSER-CHROME |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-07-24 | Name : The remote Fedora host is missing a security update. File : fedora_2017-98bed96d12.nasl - Type : ACT_GATHER_INFO |
2017-07-17 | Name : The remote Fedora host is missing a security update. File : fedora_2017-c5b2c9a435.nasl - Type : ACT_GATHER_INFO |
2017-04-17 | Name : The remote Fedora host is missing a security update. File : fedora_2017-ae1fde5fb8.nasl - Type : ACT_GATHER_INFO |
2016-12-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3731.nasl - Type : ACT_GATHER_INFO |
2016-11-21 | Name : The remote Fedora host is missing a security update. File : fedora_2016-012de4c97e.nasl - Type : ACT_GATHER_INFO |
2016-11-21 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2016-35049d9d97.nasl - Type : ACT_GATHER_INFO |
2016-11-10 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2016-c671aae490.nasl - Type : ACT_GATHER_INFO |
2016-11-03 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3113-1.nasl - Type : ACT_GATHER_INFO |
2016-11-01 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_9118961b9fa511e6a2653065ec8fd3ec.nasl - Type : ACT_GATHER_INFO |
2016-10-31 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201610-09.nasl - Type : ACT_GATHER_INFO |
2016-10-25 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-2597.nasl - Type : ACT_GATHER_INFO |
2016-10-19 | Name : A web browser installed on the remote Windows host is affected by multiple vu... File : google_chrome_54_0_2840_59.nasl - Type : ACT_GATHER_INFO |
2016-10-19 | Name : A web browser installed on the remote macOS or Mac OS X host is affected by m... File : macosx_google_chrome_54_0_2840_59.nasl - Type : ACT_GATHER_INFO |
2016-10-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-2067.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2018-01-05 09:26:24 |
|
2016-10-19 13:25:47 |
|
2016-10-17 13:24:32 |
|