Lucene search

K
kasperskyKaspersky LabKLA10893
HistoryOct 26, 2016 - 12:00 a.m.

KLA10893 Multiple vulnerabilities in Yandex browser

2016-10-2600:00:00
Kaspersky Lab
threats.kaspersky.com
56

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.6%

Multiple serious vulnerabilities have been found in Yandex Browser. Malicious users can exploit these vulnerabilities to inject arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Cross-site scripting vulnerabilities at Translator and BookReader can be exploited to inject arbitrary JavaScript code;
  2. CSRF vulnerability at synchronization form can be exploited to obtain sensitive information;
  3. An unknown vulnerability at Anti-phishing warning can be exploited remotely to brute-force passwords via injected JavaScript;
  4. An unknown vulnerability at Security WiFi can be exploited remotely to obtain sensitive information.

Technical details

Vulnerability (2) can be exploited to steal data saved in browser profile.

Vulnerability (4) can be exploited to sniff traffic from open or protected wi-fi networks.

Original advisories

Yandex Browser changelogs

Related products

Yandex-Browser

CVE list

CVE-2016-8506 warning

CVE-2016-8505 warning

CVE-2016-8504 warning

CVE-2016-8503 warning

CVE-2016-8502 warning

CVE-2016-8501 warning

Solution

Update to the latest version

Get Yandex Browser

Impacts

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • CI

Code injection. Exploitation of vulnerabilities with this impact can lead to changes in target code.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Yandex Browser versions earlier than 16.9 excluding version 16.7

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.6%

Related for KLA10893