[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-5166Date: (C)2016-09-12   (M)2023-12-22


The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks via a crafted web page that is accessed with the "Save page as" menu choice.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 3.1CVSS Score : 2.6
Exploit Score: 1.6Exploit Score: 4.9
Impact Score: 1.4Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: HIGH
Privileges Required: NONEAuthentication: NONE
User Interaction: REQUIREDConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: LOWAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
-1036729
-92717
DSA-3660
GLSA-201610-09
RHSA-2016:1854
SUSE-SU-2016:2251
https://codereview.chromium.org/2075273002
https://crbug.com/616429
https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html
openSUSE-SU-2016:2250
openSUSE-SU-2016:2296
openSUSE-SU-2016:2349

CPE    1
cpe:/a:google:chrome
CWE    1
CWE-200
OVAL    13
oval:org.secpod.oval:def:505281
oval:org.secpod.oval:def:111429
oval:org.secpod.oval:def:111307
oval:org.secpod.oval:def:36890
...

© SecPod Technologies