[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-1706Date: (C)2016-08-25   (M)2023-12-22


The PPAPI implementation in Google Chrome before 52.0.2743.82 does not validate the origin of IPC messages to the plugin broker process that should have come from the browser process, which allows remote attackers to bypass a sandbox protection mechanism via an unexpected message type, related to broker_process_dispatcher.cc, ppapi_plugin_process_host.cc, ppapi_thread.cc, and render_frame_message_filter.cc.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.6CVSS Score : 9.3
Exploit Score: 2.8Exploit Score: 8.6
Impact Score: 6.0Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: REQUIREDConfidentiality: COMPLETE
Scope: CHANGEDIntegrity: COMPLETE
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  
Reference:
-1036428
DSA-3637
RHSA-2016:1485
USN-3041-1
http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
https://codereview.chromium.org/2069853002/
https://crbug.com/610600
openSUSE-SU-2016:1865
openSUSE-SU-2016:1868
openSUSE-SU-2016:1869
openSUSE-SU-2016:1918

CPE    1
cpe:/a:google:chrome
CWE    1
CWE-20
OVAL    12
oval:org.secpod.oval:def:505604
oval:org.secpod.oval:def:36383
oval:org.secpod.oval:def:602576
oval:org.secpod.oval:def:703221
...

© SecPod Technologies