Google Chrome < 50.0.2661.94 Multiple Vulnerabilities (Mac OS X)
2016-04-29T00:00:00
ID MACOSX_GOOGLE_CHROME_50_0_2661_94.NASL Type nessus Reporter This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2019-11-19T00:00:00
Description
The version of Google Chrome installed on the remote Mac OS X host is prior to 50.0.2661.94. It is, therefore, affected by multiple vulnerabilities :
An out-of-bounds write error exists in Blink that allows a context-dependent attacker to execute arbitrary code.
(CVE-2016-1660)
A flaw exists due to improper validation of user-supplied input when handling cross-process frames.
A context-dependent attacker can exploit this to corrupt memory, resulting in the execution of arbitrary code.
(CVE-2016-1661)
A use-after-free error exists in the extensions component. A context-dependent attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1662)
A use-after-free free error exists in Blink's V8 bindings. A context-dependent attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1663)
An unspecified flaw exists that allows a context-dependent attacker to spoof the address bar.
(CVE-2016-1664)
An unspecified flaw exists in V8 that allows a context-dependent attacker to disclose sensitive information. (CVE-2016-1665)
Multiple unspecified vulnerabilities exist that allow a a context-dependent attacker to execute arbitrary code.
(CVE-2016-1666)
A same-origin bypass vulnerability exists in Skia in the pinToByte() function in effects/SkArithmeticMode.cpp due to improper handling of intermediate color values. An unauthenticated, remote attacker can exploit this, via timing attacks using the SVG 'feComposite' filter, to bypass the same-origin policy. (CVE-2016-5168)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(90795);
script_version("1.12");
script_cvs_date("Date: 2019/11/19");
script_cve_id(
"CVE-2016-1660",
"CVE-2016-1661",
"CVE-2016-1662",
"CVE-2016-1663",
"CVE-2016-1664",
"CVE-2016-1665",
"CVE-2016-1666",
"CVE-2016-5168"
);
script_bugtraq_id(89106);
script_name(english:"Google Chrome < 50.0.2661.94 Multiple Vulnerabilities (Mac OS X)");
script_summary(english:"Checks the version of Google Chrome.");
script_set_attribute(attribute:"synopsis", value:
"A web browser installed on the remote Mac OS X host is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Google Chrome installed on the remote Mac OS X host is
prior to 50.0.2661.94. It is, therefore, affected by multiple
vulnerabilities :
- An out-of-bounds write error exists in Blink that allows
a context-dependent attacker to execute arbitrary code.
(CVE-2016-1660)
- A flaw exists due to improper validation of
user-supplied input when handling cross-process frames.
A context-dependent attacker can exploit this to corrupt
memory, resulting in the execution of arbitrary code.
(CVE-2016-1661)
- A use-after-free error exists in the extensions
component. A context-dependent attacker can exploit this
to dereference already freed memory, resulting in the
execution of arbitrary code. (CVE-2016-1662)
- A use-after-free free error exists in Blink's V8
bindings. A context-dependent attacker can exploit this
to dereference already freed memory, resulting in the
execution of arbitrary code. (CVE-2016-1663)
- An unspecified flaw exists that allows a
context-dependent attacker to spoof the address bar.
(CVE-2016-1664)
- An unspecified flaw exists in V8 that allows a
context-dependent attacker to disclose sensitive
information. (CVE-2016-1665)
- Multiple unspecified vulnerabilities exist that allow a
a context-dependent attacker to execute arbitrary code.
(CVE-2016-1666)
- A same-origin bypass vulnerability exists in Skia in the
pinToByte() function in effects/SkArithmeticMode.cpp due
to improper handling of intermediate color values. An
unauthenticated, remote attacker can exploit this, via
timing attacks using the SVG 'feComposite' filter, to
bypass the same-origin policy. (CVE-2016-5168)");
# http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?754e2284");
script_set_attribute(attribute:"solution", value:
"Upgrade to Google Chrome version 50.0.2661.94 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-1662");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/02/05");
script_set_attribute(attribute:"patch_publication_date", value:"2016/04/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/04/29");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("macosx_google_chrome_installed.nbin");
script_require_keys("MacOSX/Google Chrome/Installed");
exit(0);
}
include("google_chrome_version.inc");
get_kb_item_or_exit("MacOSX/Google Chrome/Installed");
google_chrome_check_version(fix:'50.0.2661.94', severity:SECURITY_HOLE);
{"id": "MACOSX_GOOGLE_CHROME_50_0_2661_94.NASL", "type": "nessus", "bulletinFamily": "scanner", "title": "Google Chrome < 50.0.2661.94 Multiple Vulnerabilities (Mac OS X)", "description": "The version of Google Chrome installed on the remote Mac OS X host is prior to 50.0.2661.94. It is, therefore, affected by multiple vulnerabilities :\n\n - An out-of-bounds write error exists in Blink that allows a context-dependent attacker to execute arbitrary code.\n (CVE-2016-1660)\n\n - A flaw exists due to improper validation of user-supplied input when handling cross-process frames.\n A context-dependent attacker can exploit this to corrupt memory, resulting in the execution of arbitrary code.\n (CVE-2016-1661)\n\n - A use-after-free error exists in the extensions component. A context-dependent attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1662)\n\n - A use-after-free free error exists in Blink's V8 bindings. A context-dependent attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1663)\n\n - An unspecified flaw exists that allows a context-dependent attacker to spoof the address bar.\n (CVE-2016-1664)\n\n - An unspecified flaw exists in V8 that allows a context-dependent attacker to disclose sensitive information. (CVE-2016-1665)\n\n - Multiple unspecified vulnerabilities exist that allow a a context-dependent attacker to execute arbitrary code.\n (CVE-2016-1666)\n\n - A same-origin bypass vulnerability exists in Skia in the pinToByte() function in effects/SkArithmeticMode.cpp due to improper handling of intermediate color values. An unauthenticated, remote attacker can exploit this, via timing attacks using the SVG 'feComposite' filter, to bypass the same-origin policy. (CVE-2016-5168)", "published": "2016-04-29T00:00:00", "modified": "2019-11-19T00:00:00", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {}, "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "href": "https://www.tenable.com/plugins/nessus/90795", "reporter": "This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661", "http://www.nessus.org/u?754e2284", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5168", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662"], "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-5168"], "immutableFields": [], "lastseen": "2021-08-19T12:42:07", "viewCount": 8, "enchantments": {"dependencies": {"references": [{"type": "archlinux", "idList": ["ASA-201605-7"]}, {"type": "chrome", "idList": ["GCSA-3936814140712444025"]}, {"type": "cve", "idList": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-5168"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3564-1:38927", "DEBIAN:DSA-3564-1:520F5"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2016-1660", "DEBIANCVE:CVE-2016-1661", "DEBIANCVE:CVE-2016-1662", "DEBIANCVE:CVE-2016-1663", "DEBIANCVE:CVE-2016-1664", "DEBIANCVE:CVE-2016-1665", "DEBIANCVE:CVE-2016-1666", "DEBIANCVE:CVE-2016-5168"]}, {"type": "freebsd", "idList": ["7DA1DA96-24BB-11E6-BD31-3065EC8FD3EC"]}, {"type": "gentoo", "idList": ["GLSA-201605-02"]}, {"type": "kaspersky", "idList": ["KLA10799"]}, {"type": "nessus", "idList": ["9370.PASL", "DEBIAN_DSA-3564.NASL", "FREEBSD_PKG_7DA1DA9624BB11E6BD313065EC8FD3EC.NASL", "GENTOO_GLSA-201605-02.NASL", "GOOGLE_CHROME_50_0_2661_94.NASL", "OPENSUSE-2016-538.NASL", "OPENSUSE-2016-539.NASL", "OPENSUSE-2016-756.NASL", "REDHAT-RHSA-2016-0707.NASL", "UBUNTU_USN-2960-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310131292", "OPENVAS:1361412562310703564", "OPENVAS:1361412562310807571", "OPENVAS:1361412562310807572", "OPENVAS:1361412562310807573", "OPENVAS:1361412562310842771", "OPENVAS:1361412562310851287", "OPENVAS:1361412562310851288", "OPENVAS:1361412562310851355", "OPENVAS:703564"]}, {"type": "redhat", "idList": ["RHSA-2016:0707"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2016:1207-1", "OPENSUSE-SU-2016:1208-1", "OPENSUSE-SU-2016:1209-1", "OPENSUSE-SU-2016:1655-1"]}, {"type": "threatpost", "idList": ["THREATPOST:A2F130EE78FC04CA75C21282287E3B83"]}, {"type": "ubuntu", "idList": ["USN-2960-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2016-1660", "UB:CVE-2016-1661", "UB:CVE-2016-1662", "UB:CVE-2016-1663", "UB:CVE-2016-1664", "UB:CVE-2016-1665", "UB:CVE-2016-1666", "UB:CVE-2016-5168"]}], "rev": 4}, "score": {"value": 9.4, "vector": "NONE"}, "backreferences": {"references": [{"type": "archlinux", "idList": ["ASA-201605-7"]}, {"type": "chrome", "idList": ["GCSA-3936814140712444025"]}, {"type": "cve", "idList": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3564-1:520F5"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2016-5168"]}, {"type": "freebsd", "idList": ["7DA1DA96-24BB-11E6-BD31-3065EC8FD3EC"]}, {"type": "nessus", "idList": ["DEBIAN_DSA-3564.NASL", "FREEBSD_PKG_7DA1DA9624BB11E6BD313065EC8FD3EC.NASL", "GOOGLE_CHROME_50_0_2661_94.NASL", "OPENSUSE-2016-538.NASL", "OPENSUSE-2016-539.NASL", "OPENSUSE-2016-756.NASL", "REDHAT-RHSA-2016-0707.NASL", "UBUNTU_USN-2960-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310842771"]}, {"type": "redhat", "idList": ["RHSA-2016:0707"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2016:1207-1", "OPENSUSE-SU-2016:1208-1", "OPENSUSE-SU-2016:1209-1", "OPENSUSE-SU-2016:1655-1"]}, {"type": "threatpost", "idList": ["THREATPOST:A2F130EE78FC04CA75C21282287E3B83"]}, {"type": "ubuntu", "idList": ["USN-2960-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2016-1663"]}]}, "exploitation": null, "vulnersScore": 9.4}, "pluginID": "90795", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(90795);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2019/11/19\");\n\n script_cve_id(\n \"CVE-2016-1660\",\n \"CVE-2016-1661\",\n \"CVE-2016-1662\",\n \"CVE-2016-1663\",\n \"CVE-2016-1664\",\n \"CVE-2016-1665\",\n \"CVE-2016-1666\",\n \"CVE-2016-5168\"\n );\n script_bugtraq_id(89106);\n\n script_name(english:\"Google Chrome < 50.0.2661.94 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Mac OS X host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\nprior to 50.0.2661.94. It is, therefore, affected by multiple\nvulnerabilities :\n\n - An out-of-bounds write error exists in Blink that allows\n a context-dependent attacker to execute arbitrary code.\n (CVE-2016-1660)\n\n - A flaw exists due to improper validation of\n user-supplied input when handling cross-process frames.\n A context-dependent attacker can exploit this to corrupt\n memory, resulting in the execution of arbitrary code.\n (CVE-2016-1661)\n\n - A use-after-free error exists in the extensions\n component. A context-dependent attacker can exploit this\n to dereference already freed memory, resulting in the\n execution of arbitrary code. (CVE-2016-1662)\n\n - A use-after-free free error exists in Blink's V8\n bindings. A context-dependent attacker can exploit this\n to dereference already freed memory, resulting in the\n execution of arbitrary code. (CVE-2016-1663)\n\n - An unspecified flaw exists that allows a\n context-dependent attacker to spoof the address bar.\n (CVE-2016-1664)\n\n - An unspecified flaw exists in V8 that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2016-1665)\n\n - Multiple unspecified vulnerabilities exist that allow a\n a context-dependent attacker to execute arbitrary code.\n (CVE-2016-1666)\n\n - A same-origin bypass vulnerability exists in Skia in the\n pinToByte() function in effects/SkArithmeticMode.cpp due\n to improper handling of intermediate color values. An\n unauthenticated, remote attacker can exploit this, via\n timing attacks using the SVG 'feComposite' filter, to\n bypass the same-origin policy. (CVE-2016-5168)\");\n # http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?754e2284\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 50.0.2661.94 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-1662\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'50.0.2661.94', severity:SECURITY_HOLE);\n", "naslFamily": "MacOS X Local Security Checks", "cpe": ["cpe:/a:google:chrome"], "solution": "Upgrade to Google Chrome version 50.0.2661.94 or later.", "nessusSeverity": "Critical", "cvssScoreSource": "CVE-2016-1662", "vpr": {"risk factor": "Medium", "score": "5.9"}, "exploitAvailable": false, "exploitEase": "No known exploits are available", "patchPublicationDate": "2016-04-28T00:00:00", "vulnerabilityPublicationDate": "2016-02-05T00:00:00", "exploitableWith": [], "_state": {"dependencies": 1647589307, "score": 0}}
{"openvas": [{"lastseen": "2019-07-19T22:11:10", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2016-05-02T00:00:00", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update_28-2016-04)-Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-5168", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310807571", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807571", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update_28-2016-04)-Windows\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807571\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\",\n \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\", \"CVE-2016-5168\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-05-02 14:07:18 +0530 (Mon, 02 May 2016)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update_28-2016-04)-Windows\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exist due to\n\n - An out-of-bounds write error in Blink.\n\n - Memory corruption in cross-process frames.\n\n - An use-after-free error in extensions.\n\n - An Use-after-free error in Blink's V8 bindings.\n\n - Address bar spoofing vulnerability.\n\n - An information leak in V8.\n\n - The Various fixes from internal audits, fuzzing, and other initiatives.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this\n vulnerability will allow an unauthenticated, remote attacker to gain access\n to sensitive information, to execute arbitrary code, to cause a denial of\n service (DoS) condition and to conduct spoofing attacks on a targeted system.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 50.0.2661.94 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 50.0.2661.94 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2016/04/stable-channel-update_28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chr_ver = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chr_ver, test_version:\"50.0.2661.94\"))\n{\n report = report_fixed_ver(installed_version:chr_ver, fixed_version:\"50.0.2661.94\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:12:06", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2016-05-02T00:00:00", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update_28-2016-04)-Linux", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-5168", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310807572", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807572", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update_28-2016-04)-Linux\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807572\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\",\n \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\", \"CVE-2016-5168\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-05-02 14:07:18 +0530 (Mon, 02 May 2016)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update_28-2016-04)-Linux\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exist due to\n\n - An out-of-bounds write error in Blink.\n\n - Memory corruption in cross-process frames.\n\n - An use-after-free error in extensions.\n\n - An Use-after-free error in Blink's V8 bindings.\n\n - Address bar spoofing vulnerability.\n\n - An information leak in V8.\n\n - The Various fixes from internal audits, fuzzing, and other initiatives.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this\n vulnerability will allow an unauthenticated, remote attacker to gain access\n to sensitive information, to execute arbitrary code, to cause a denial of\n service (DoS) condition and to conduct spoofing attacks on a targeted system.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 50.0.2661.94 on Linux\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 50.0.2661.94 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2016/04/stable-channel-update_28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chr_ver = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chr_ver, test_version:\"50.0.2661.94\"))\n{\n report = report_fixed_ver(installed_version:chr_ver, fixed_version:\"50.0.2661.94\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:12:26", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2016-05-02T00:00:00", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update_28-2016-04)-MAC OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-5168", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310807573", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807573", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update_28-2016-04)-MAC OS X\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807573\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\",\n \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\", \"CVE-2016-5168\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-05-02 14:07:18 +0530 (Mon, 02 May 2016)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update_28-2016-04)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exist due to\n\n - An out-of-bounds write error in Blink.\n\n - Memory corruption in cross-process frames.\n\n - An use-after-free error in extensions.\n\n - An Use-after-free error in Blink's V8 bindings.\n\n - Address bar spoofing vulnerability.\n\n - An information leak in V8.\n\n - The Various fixes from internal audits, fuzzing, and other initiatives.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this\n vulnerability will allow an unauthenticated, remote attacker to gain access\n to sensitive information, to execute arbitrary code, to cause a denial of\n service (DoS) condition and to conduct spoofing attacks on a targeted system.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 50.0.2661.94 on MAC OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 50.0.2661.94 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2016/04/stable-channel-update_28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chr_ver = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chr_ver, test_version:\"50.0.2661.94\"))\n{\n report = report_fixed_ver(installed_version:chr_ver, fixed_version:\"50.0.2661.94\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:46", "description": "Several vulnerabilities have been\ndiscovered in the chromium web browser.\n\nCVE-2016-1660\nAtte Kettunen discovered an out-of-bounds write issue.\n\nCVE-2016-1661\nWadih Matar discovered a memory corruption issue.\n\nCVE-2016-1662\nRob Wu discovered a use-after-free issue related to extensions.\n\nCVE-2016-1663\nA use-after-free issue was discovered in Blink", "cvss3": {}, "published": "2016-05-02T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3564-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703564", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703564", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3564.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Auto-generated from advisory DSA 3564-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703564\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\",\n \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n script_name(\"Debian Security Advisory DSA 3564-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-02 00:00:00 +0200 (Mon, 02 May 2016)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3564.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie),\nthese problems have been fixed in version 50.0.2661.94-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 50.0.2661.94-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been\ndiscovered in the chromium web browser.\n\nCVE-2016-1660\nAtte Kettunen discovered an out-of-bounds write issue.\n\nCVE-2016-1661\nWadih Matar discovered a memory corruption issue.\n\nCVE-2016-1662\nRob Wu discovered a use-after-free issue related to extensions.\n\nCVE-2016-1663\nA use-after-free issue was discovered in Blink's bindings to V8.\n\nCVE-2016-1664\nWadih Matar discovered a way to spoof URLs.\n\nCVE-2016-1665\ngksgudtjr456 discovered an information leak in the v8 javascript\nlibrary.\n\nCVE-2016-1666\nThe chrome development team found and fixed various issues during\ninternal auditing.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed\nsoftware version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"50.0.2661.94-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"50.0.2661.94-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"50.0.2661.94-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"50.0.2661.94-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"50.0.2661.94-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-24T12:54:19", "description": "Several vulnerabilities have been\ndiscovered in the chromium web browser.\n\nCVE-2016-1660 \nAtte Kettunen discovered an out-of-bounds write issue.\n\nCVE-2016-1661 \nWadih Matar discovered a memory corruption issue.\n\nCVE-2016-1662 \nRob Wu discovered a use-after-free issue related to extensions.\n\nCVE-2016-1663 \nA use-after-free issue was discovered in Blink", "cvss3": {}, "published": "2016-05-02T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3564-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703564", "href": "http://plugins.openvas.org/nasl.php?oid=703564", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3564.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3564-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703564);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\",\n \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n script_name(\"Debian Security Advisory DSA 3564-1 (chromium-browser - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-05-02 00:00:00 +0200 (Mon, 02 May 2016)\");\n script_tag(name: \"cvss_base\", value: \"10.0\");\n script_tag(name: \"cvss_base_vector\", value: \"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3564.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"chromium-browser on Debian Linux\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie),\nthese problems have been fixed in version 50.0.2661.94-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 50.0.2661.94-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities have been\ndiscovered in the chromium web browser.\n\nCVE-2016-1660 \nAtte Kettunen discovered an out-of-bounds write issue.\n\nCVE-2016-1661 \nWadih Matar discovered a memory corruption issue.\n\nCVE-2016-1662 \nRob Wu discovered a use-after-free issue related to extensions.\n\nCVE-2016-1663 \nA use-after-free issue was discovered in Blink's bindings to V8.\n\nCVE-2016-1664 \nWadih Matar discovered a way to spoof URLs.\n\nCVE-2016-1665 \ngksgudtjr456 discovered an information leak in the v8 javascript\nlibrary.\n\nCVE-2016-1666 \nThe chrome development team found and fixed various issues during\ninternal auditing.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed\nsoftware version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"50.0.2661.94-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"50.0.2661.94-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"50.0.2661.94-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"50.0.2661.94-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"50.0.2661.94-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-01-31T18:34:30", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-05-06T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for Chromium (openSUSE-SU-2016:1209-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310851287", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851287", "sourceData": "# Copyright (C) 2016 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851287\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-05-06 15:29:30 +0530 (Fri, 06 May 2016)\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\",\n \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for Chromium (openSUSE-SU-2016:1209-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Chromium was updated to 50.0.2661.94 to fix a number of vulnerabilities\n (boo#977830):\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n\n - CVE-2016-1661: Memory corruption in cross-process frames\n\n - CVE-2016-1662: Use-after-free in extensions\n\n - CVE-2016-1663: Use-after-free in Blink's V8 bindings\n\n - CVE-2016-1664: Address bar spoofing\n\n - CVE-2016-1665: Information leak in V8\n\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other\n initiatives\");\n\n script_tag(name:\"affected\", value:\"Chromium on openSUSE 13.2\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2016:1209-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE13\\.2\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE13.2\")\n{\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~50.0.2661.94~97.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~50.0.2661.94~97.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~50.0.2661.94~97.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~50.0.2661.94~97.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~50.0.2661.94~97.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-gnome\", rpm:\"chromium-desktop-gnome~50.0.2661.94~97.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-kde\", rpm:\"chromium-desktop-kde~50.0.2661.94~97.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo\", rpm:\"chromium-ffmpegsumo~50.0.2661.94~97.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo-debuginfo\", rpm:\"chromium-ffmpegsumo-debuginfo~50.0.2661.94~97.1\", rls:\"openSUSE13.2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T18:35:46", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-05-06T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for Chromium (openSUSE-SU-2016:1208-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310851288", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851288", "sourceData": "# Copyright (C) 2016 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851288\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-05-06 15:29:04 +0530 (Fri, 06 May 2016)\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\",\n \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for Chromium (openSUSE-SU-2016:1208-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Chromium was updated to 50.0.2661.94 to fix a number of vulnerabilities\n (boo#977830):\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n\n - CVE-2016-1661: Memory corruption in cross-process frames\n\n - CVE-2016-1662: Use-after-free in extensions\n\n - CVE-2016-1663: Use-after-free in Blink's V8 bindings\n\n - CVE-2016-1664: Address bar spoofing\n\n - CVE-2016-1665: Information leak in V8\n\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other\n initiatives\");\n\n script_tag(name:\"affected\", value:\"Chromium on openSUSE Leap 42.1\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2016:1208-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap42\\.1\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.1\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~50.0.2661.94~45.1\", rls:\"openSUSELeap42.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~50.0.2661.94~45.1\", rls:\"openSUSELeap42.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~50.0.2661.94~45.1\", rls:\"openSUSELeap42.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~50.0.2661.94~45.1\", rls:\"openSUSELeap42.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~50.0.2661.94~45.1\", rls:\"openSUSELeap42.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-gnome\", rpm:\"chromium-desktop-gnome~50.0.2661.94~45.1\", rls:\"openSUSELeap42.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-kde\", rpm:\"chromium-desktop-kde~50.0.2661.94~45.1\", rls:\"openSUSELeap42.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo\", rpm:\"chromium-ffmpegsumo~50.0.2661.94~45.1\", rls:\"openSUSELeap42.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo-debuginfo\", rpm:\"chromium-ffmpegsumo-debuginfo~50.0.2661.94~45.1\", rls:\"openSUSELeap42.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:48", "description": "Mageia Linux Local Security Checks mgasa-2016-0160", "cvss3": {}, "published": "2016-05-09T00:00:00", "type": "openvas", "title": "Mageia Linux Local Check: mgasa-2016-0160", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2015-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2019-03-14T00:00:00", "id": "OPENVAS:1361412562310131292", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310131292", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: mgasa-2016-0160.nasl 14180 2019-03-14 12:29:16Z cfischer $\n#\n# Mageia Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2016 Eero Volotinen, http://www.solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.131292\");\n script_version(\"$Revision: 14180 $\");\n script_tag(name:\"creation_date\", value:\"2016-05-09 14:17:54 +0300 (Mon, 09 May 2016)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-14 13:29:16 +0100 (Thu, 14 Mar 2019) $\");\n script_name(\"Mageia Linux Local Check: mgasa-2016-0160\");\n script_tag(name:\"insight\", value:\"Chromium-browser-stable 50.0.2661.94 fixes several security issues: an out-of-bounds write problem in Blink (CVE-2016-1660), memory corruption in cross-process frames (CVE-2016-1661), use-after-free bugs in extensions (CVE-2016-1662) and in Blink's V8 bindings (CVE-2016-1663), an address bar spoofing vulnerability (CVE-2016-1664), an information leak in V8 (CVE-2016-1665), and various fixes from upstream's internal audits, fuzzing, and other initiatives (CVE-2015-1666).\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://advisories.mageia.org/MGASA-2016-0160.html\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\", \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mageia_linux\", \"ssh/login/release\", re:\"ssh/login/release=MAGEIA5\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Mageia Linux Local Security Checks mgasa-2016-0160\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Mageia Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MAGEIA5\")\n{\nif ((res = isrpmvuln(pkg:\"chromium-browser-stable\", rpm:\"chromium-browser-stable~50.0.2661.94~1.mga5\", rls:\"MAGEIA5\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T18:36:05", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-06-23T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for Chromium (openSUSE-SU-2016:1655-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1667", "CVE-2016-1665", "CVE-2016-1668", "CVE-2016-1669", "CVE-2016-1666", "CVE-2016-1704", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1670", "CVE-2016-1660"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310851355", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851355", "sourceData": "# Copyright (C) 2016 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851355\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-06-23 05:24:43 +0200 (Thu, 23 Jun 2016)\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\",\n \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\", \"CVE-2016-1667\",\n \"CVE-2016-1668\", \"CVE-2016-1669\", \"CVE-2016-1670\", \"CVE-2016-1704\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for Chromium (openSUSE-SU-2016:1655-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Chromium was updated to 51.0.2704.103 to fix three vulnerabilities:\n\n - CVE-2016-1704: Various fixes from internal audits, fuzzing and other\n initiatives (shared identifier) (boo#985397)\n\n Includes vulnerability fixes from 50.0.2661.102 (boo#979859):\n\n - CVE-2016-1667: Same origin bypass in DOM\n\n - CVE-2016-1668: Same origin bypass in Blink V8 bindings\n\n - CVE-2016-1669: Buffer overflow in V8\n\n - CVE-2016-1670: Race condition in loader\n\n Includes vulnerability fixes from 50.0.2661.94 (boo#977830):\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n\n - CVE-2016-1661: Memory corruption in cross-process frames\n\n - CVE-2016-1662: Use-after-free in extensions\n\n - CVE-2016-1663: Use-after-free in Blink's V8 bindings\n\n - CVE-2016-1664: Address bar spoofing\n\n - CVE-2016-1665: Information leak in V8\n\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other\n initiatives\");\n\n script_tag(name:\"affected\", value:\"Chromium on openSUSE 13.1\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2016:1655-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE13\\.1\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE13.1\")\n{\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~51.0.2704.103~147.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~51.0.2704.103~147.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~51.0.2704.103~147.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~51.0.2704.103~147.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~51.0.2704.103~147.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-gnome\", rpm:\"chromium-desktop-gnome~51.0.2704.103~147.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-kde\", rpm:\"chromium-desktop-kde~51.0.2704.103~147.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo\", rpm:\"chromium-ffmpegsumo~51.0.2704.103~147.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo-debuginfo\", rpm:\"chromium-ffmpegsumo-debuginfo~51.0.2704.103~147.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:48", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2016-05-19T00:00:00", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2960-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1667", "CVE-2016-1665", "CVE-2016-1668", "CVE-2016-1669", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1670", "CVE-2016-1660"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842771", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842771", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for oxide-qt USN-2960-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842771\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-19 05:21:28 +0200 (Thu, 19 May 2016)\");\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1663\", \"CVE-2016-1665\",\n\t\t\"CVE-2016-1666\", \"CVE-2016-1667\", \"CVE-2016-1668\", \"CVE-2016-1669\",\n\t\t\"CVE-2016-1670\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for oxide-qt USN-2960-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"An out of bounds write was discovered in\n Blink. If a user were tricked in to opening a specially crafted website, an\n attacker could potentially exploit this to cause a denial of service via\n renderer crash, or execute arbitrary code. (CVE-2016-1660)\n\n It was discovered that Blink assumes that a frame which passes same-origin\n checks is local in some cases. If a user were tricked in to opening a\n specially crafted website, an attacker could potentially exploit this to\n cause a denial of service via renderer crash, or execute arbitrary code.\n (CVE-2016-1661)\n\n A use-after-free was discovered in the V8 bindings in Blink. If a user\n were tricked in to opening a specially crafted website, an attacker could\n potentially exploit this to cause a denial of service via renderer crash,\n or execute arbitrary code. (CVE-2016-1663)\n\n It was discovered that the JSGenericLowering class in V8 mishandles\n comparison operators. If a user were tricked in to opening a specially\n crafted website, an attacker could potentially exploit this to obtain\n sensitive information. (CVE-2016-1665)\n\n Multiple security issues were discovered in Chromium. If a user were\n tricked in to opening a specially crafted website, an attacker could\n potentially exploit these to read uninitialized memory, cause a denial\n of service via application crash or execute arbitrary code.\n (CVE-2016-1666)\n\n It was discovered that the TreeScope::adoptIfNeeded function in Blink\n does not prevent script execution during node-adoption operations. If a\n user were tricked in to opening a specially crafted website, an attacker\n could potentially exploit this to bypass same origin restrictions.\n (CVE-2016-1667)\n\n It was discovered that the forEachForBinding in the V8 bindings in Blink\n uses an improper creation context. If a user were tricked in to opening a\n specially crafted website, an attacker could potentially exploit this to\n bypass same origin restrictions. (CVE-2016-1668)\n\n A buffer overflow was discovered in V8. If a user were tricked in to\n opening a specially crafted website, an attacker could potentially exploit\n this to cause a denial of service via renderer crash, or execute arbitrary\n code. (CVE-2016-1669)\n\n A race condition was discovered in ResourceDispatcherHostImpl in Chromium.\n An attacker could potentially exploit this to make arbitrary HTTP\n requests. (CVE-2016-1670)\");\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 16.04 LTS,\n Ubuntu 15.10,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"2960-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2960-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|16\\.04 LTS|15\\.10)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.14.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.14.9-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.14.9-0ubuntu0.16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.14.9-0ubuntu0.16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU15.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.14.9-0ubuntu0.15.10.1\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.14.9-0ubuntu0.15.10.1\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2022-04-12T15:33:42", "description": "The version of Google Chrome installed on the remote Windows host is prior to 50.0.2661.94. It is, therefore, affected by multiple vulnerabilities :\n\n - An out-of-bounds write error exists in Blink that allows a context-dependent attacker to execute arbitrary code.\n (CVE-2016-1660)\n\n - A flaw exists due to improper validation of user-supplied input when handling cross-process frames.\n A context-dependent attacker can exploit this to corrupt memory, resulting in the execution of arbitrary code.\n (CVE-2016-1661)\n\n - A use-after-free error exists in the extensions component. A context-dependent attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1662)\n\n - A use-after-free free error exists in Blink's V8 bindings. A context-dependent attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1663)\n\n - An unspecified flaw exists that allows a context-dependent attacker to spoof the address bar.\n (CVE-2016-1664)\n\n - An unspecified flaw exists in V8 that allows a context-dependent attacker to disclose sensitive information. (CVE-2016-1665)\n\n - Multiple unspecified vulnerabilities exist that allow a a context-dependent attacker to execute arbitrary code.\n (CVE-2016-1666)\n\n - A same-origin bypass vulnerability exists in Skia in the pinToByte() function in effects/SkArithmeticMode.cpp due to improper handling of intermediate color values. An unauthenticated, remote attacker can exploit this, via timing attacks using the SVG 'feComposite' filter, to bypass the same-origin policy. (CVE-2016-5168)", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-04-29T00:00:00", "type": "nessus", "title": "Google Chrome < 50.0.2661.94 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-5168"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_50_0_2661_94.NASL", "href": "https://www.tenable.com/plugins/nessus/90794", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90794);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\n \"CVE-2016-1660\",\n \"CVE-2016-1661\",\n \"CVE-2016-1662\",\n \"CVE-2016-1663\",\n \"CVE-2016-1664\",\n \"CVE-2016-1665\",\n \"CVE-2016-1666\",\n \"CVE-2016-5168\"\n );\n script_bugtraq_id(89106);\n\n script_name(english:\"Google Chrome < 50.0.2661.94 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 50.0.2661.94. It is, therefore, affected by multiple\nvulnerabilities :\n\n - An out-of-bounds write error exists in Blink that allows\n a context-dependent attacker to execute arbitrary code.\n (CVE-2016-1660)\n\n - A flaw exists due to improper validation of\n user-supplied input when handling cross-process frames.\n A context-dependent attacker can exploit this to corrupt\n memory, resulting in the execution of arbitrary code.\n (CVE-2016-1661)\n\n - A use-after-free error exists in the extensions\n component. A context-dependent attacker can exploit this\n to dereference already freed memory, resulting in the\n execution of arbitrary code. (CVE-2016-1662)\n\n - A use-after-free free error exists in Blink's V8\n bindings. A context-dependent attacker can exploit this\n to dereference already freed memory, resulting in the\n execution of arbitrary code. (CVE-2016-1663)\n\n - An unspecified flaw exists that allows a\n context-dependent attacker to spoof the address bar.\n (CVE-2016-1664)\n\n - An unspecified flaw exists in V8 that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2016-1665)\n\n - Multiple unspecified vulnerabilities exist that allow a\n a context-dependent attacker to execute arbitrary code.\n (CVE-2016-1666)\n\n - A same-origin bypass vulnerability exists in Skia in the\n pinToByte() function in effects/SkArithmeticMode.cpp due\n to improper handling of intermediate color values. An\n unauthenticated, remote attacker can exploit this, via\n timing attacks using the SVG 'feComposite' filter, to\n bypass the same-origin policy. (CVE-2016-5168)\");\n # http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?754e2284\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 50.0.2661.94 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-1662\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'50.0.2661.94', severity:SECURITY_HOLE);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:42:11", "description": "Chromium was updated to 50.0.2661.94 to fix a number of vulnerabilities (boo#977830) :\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n\n - CVE-2016-1661: Memory corruption in cross-process frames\n\n - CVE-2016-1662: Use-after-free in extensions\n\n - CVE-2016-1663: Use-after-free in Blink’s V8 bindings\n\n - CVE-2016-1664: Address bar spoofing\n\n - CVE-2016-1665: Information leak in V8\n\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other initiatives", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-05-04T00:00:00", "type": "nessus", "title": "openSUSE Security Update : Chromium (openSUSE-2016-538)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium-desktop-kde", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "cpe:/o:novell:opensuse:13.2"], "id": "OPENSUSE-2016-538.NASL", "href": "https://www.tenable.com/plugins/nessus/90878", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-538.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90878);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\", \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2016-538)\");\n script_summary(english:\"Check for the openSUSE-2016-538 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to 50.0.2661.94 to fix a number of\nvulnerabilities (boo#977830) :\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n\n - CVE-2016-1661: Memory corruption in cross-process frames\n\n - CVE-2016-1662: Use-after-free in extensions\n\n - CVE-2016-1663: Use-after-free in Blink’s V8\n bindings\n\n - CVE-2016-1664: Address bar spoofing\n\n - CVE-2016-1665: Information leak in V8\n\n - CVE-2016-1666: Various fixes from internal audits,\n fuzzing and other initiatives\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=977830\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-50.0.2661.94-97.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-debuginfo-50.0.2661.94-97.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-50.0.2661.94-97.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debuginfo-50.0.2661.94-97.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debugsource-50.0.2661.94-97.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-gnome-50.0.2661.94-97.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-kde-50.0.2661.94-97.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-50.0.2661.94-97.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-debuginfo-50.0.2661.94-97.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:42:07", "description": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 50.0.2661.94.\n\nSecurity Fix(es) :\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1660, CVE-2016-1661, CVE-2016-1662, CVE-2016-1663, CVE-2016-1666, CVE-2016-1664, CVE-2016-1665)", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-05-03T00:00:00", "type": "nessus", "title": "RHEL 6 : chromium-browser (RHSA-2016:0707)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2020-05-29T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser", "p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.7"], "id": "REDHAT-RHSA-2016-0707.NASL", "href": "https://www.tenable.com/plugins/nessus/90852", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:0707. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(90852);\n script_version(\"2.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\", \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n script_xref(name:\"RHSA\", value:\"2016:0707\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2016:0707)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 50.0.2661.94.\n\nSecurity Fix(es) :\n\n* Multiple flaws were found in the processing of malformed web\ncontent. A web page containing malicious content could cause Chromium\nto crash, execute arbitrary code, or disclose sensitive information\nwhen visited by the victim. (CVE-2016-1660, CVE-2016-1661,\nCVE-2016-1662, CVE-2016-1663, CVE-2016-1666, CVE-2016-1664,\nCVE-2016-1665)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2016:0707\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-1660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-1661\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-1662\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-1663\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-1664\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-1665\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-1666\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/05/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2016:0707\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-50.0.2661.94-1.el6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-50.0.2661.94-1.el6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-50.0.2661.94-1.el6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-50.0.2661.94-1.el6\", allowmaj:TRUE)) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:42:10", "description": "Chromium was updated to 50.0.2661.94 to fix a number of vulnerabilities (boo#977830) :\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n\n - CVE-2016-1661: Memory corruption in cross-process frames\n\n - CVE-2016-1662: Use-after-free in extensions\n\n - CVE-2016-1663: Use-after-free in Blink’s V8 bindings\n\n - CVE-2016-1664: Address bar spoofing\n\n - CVE-2016-1665: Information leak in V8\n\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other initiatives", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-05-04T00:00:00", "type": "nessus", "title": "openSUSE Security Update : Chromium (openSUSE-2016-539)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium-desktop-kde", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "cpe:/o:novell:opensuse:42.1"], "id": "OPENSUSE-2016-539.NASL", "href": "https://www.tenable.com/plugins/nessus/90879", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-539.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90879);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\", \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2016-539)\");\n script_summary(english:\"Check for the openSUSE-2016-539 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to 50.0.2661.94 to fix a number of\nvulnerabilities (boo#977830) :\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n\n - CVE-2016-1661: Memory corruption in cross-process frames\n\n - CVE-2016-1662: Use-after-free in extensions\n\n - CVE-2016-1663: Use-after-free in Blink’s V8\n bindings\n\n - CVE-2016-1664: Address bar spoofing\n\n - CVE-2016-1665: Information leak in V8\n\n - CVE-2016-1666: Various fixes from internal audits,\n fuzzing and other initiatives\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=977830\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.1\", reference:\"chromedriver-50.0.2661.94-45.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"chromedriver-debuginfo-50.0.2661.94-45.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"chromium-50.0.2661.94-45.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"chromium-debuginfo-50.0.2661.94-45.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"chromium-debugsource-50.0.2661.94-45.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"chromium-desktop-gnome-50.0.2661.94-45.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"chromium-desktop-kde-50.0.2661.94-45.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"chromium-ffmpegsumo-50.0.2661.94-45.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"chromium-ffmpegsumo-debuginfo-50.0.2661.94-45.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:41:50", "description": "Google Chrome Releases reports :\n\n9 security fixes in this release, including :\n\n- [574802] High CVE-2016-1660: Out-of-bounds write in Blink. Credit to Atte Kettunen of OUSPG.\n\n- [601629] High CVE-2016-1661: Memory corruption in cross-process frames. Credit to Wadih Matar.\n\n- [603732] High CVE-2016-1662: Use-after-free in extensions. Credit to Rob Wu.\n\n- [603987] High CVE-2016-1663: Use-after-free in Blink's V8 bindings.\nCredit to anonymous.\n\n- [597322] Medium CVE-2016-1664: Address bar spoofing. Credit to Wadih Matar.\n\n- [606181] Medium CVE-2016-1665: Information leak in V8. Credit to HyungSeok Han.\n\n- [607652] CVE-2016-1666: Various fixes from internal audits, fuzzing and other initiatives.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-05-31T00:00:00", "type": "nessus", "title": "FreeBSD : chromium -- multiple vulnerabilities (7da1da96-24bb-11e6-bd31-3065ec8fd3ec)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium", "p-cpe:/a:freebsd:freebsd:chromium-npapi", "p-cpe:/a:freebsd:freebsd:chromium-pulse", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_7DA1DA9624BB11E6BD313065EC8FD3EC.NASL", "href": "https://www.tenable.com/plugins/nessus/91374", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91374);\n script_version(\"2.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\", \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (7da1da96-24bb-11e6-bd31-3065ec8fd3ec)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n9 security fixes in this release, including :\n\n- [574802] High CVE-2016-1660: Out-of-bounds write in Blink. Credit to\nAtte Kettunen of OUSPG.\n\n- [601629] High CVE-2016-1661: Memory corruption in cross-process\nframes. Credit to Wadih Matar.\n\n- [603732] High CVE-2016-1662: Use-after-free in extensions. Credit to\nRob Wu.\n\n- [603987] High CVE-2016-1663: Use-after-free in Blink's V8 bindings.\nCredit to anonymous.\n\n- [597322] Medium CVE-2016-1664: Address bar spoofing. Credit to Wadih\nMatar.\n\n- [606181] Medium CVE-2016-1665: Information leak in V8. Credit to\nHyungSeok Han.\n\n- [607652] CVE-2016-1666: Various fixes from internal audits, fuzzing\nand other initiatives.\"\n );\n # http://googlechromereleases.blogspot.nl/2016/04/stable-channel-update_28.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?22d8d53b\"\n );\n # https://vuxml.freebsd.org/freebsd/7da1da96-24bb-11e6-bd31-3065ec8fd3ec.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?34527654\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-npapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-pulse\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/04/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/31\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<50.0.2661.94\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-npapi<50.0.2661.94\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-pulse<50.0.2661.94\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:42:00", "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\n - CVE-2016-1660 Atte Kettunen discovered an out-of-bounds write issue.\n\n - CVE-2016-1661 Wadih Matar discovered a memory corruption issue.\n\n - CVE-2016-1662 Rob Wu discovered a use-after-free issue related to extensions.\n\n - CVE-2016-1663 A use-after-free issue was discovered in Blink's bindings to V8.\n\n - CVE-2016-1664 Wadih Matar discovered a way to spoof URLs.\n\n - CVE-2016-1665 gksgudtjr456 discovered an information leak in the v8 JavaScript library.\n\n - CVE-2016-1666 The chrome development team found and fixed various issues during internal auditing.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-05-03T00:00:00", "type": "nessus", "title": "Debian DSA-3564-1 : chromium-browser - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3564.NASL", "href": "https://www.tenable.com/plugins/nessus/90840", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3564. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90840);\n script_version(\"2.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\", \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\");\n script_xref(name:\"DSA\", value:\"3564\");\n\n script_name(english:\"Debian DSA-3564-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2016-1660\n Atte Kettunen discovered an out-of-bounds write issue.\n\n - CVE-2016-1661\n Wadih Matar discovered a memory corruption issue.\n\n - CVE-2016-1662\n Rob Wu discovered a use-after-free issue related to\n extensions.\n\n - CVE-2016-1663\n A use-after-free issue was discovered in Blink's\n bindings to V8.\n\n - CVE-2016-1664\n Wadih Matar discovered a way to spoof URLs.\n\n - CVE-2016-1665\n gksgudtjr456 discovered an information leak in the v8\n JavaScript library.\n\n - CVE-2016-1666\n The chrome development team found and fixed various\n issues during internal auditing.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1661\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1662\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1663\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1664\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1665\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3564\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 50.0.2661.94-1~deb8u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"chromedriver\", reference:\"50.0.2661.94-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium\", reference:\"50.0.2661.94-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-dbg\", reference:\"50.0.2661.94-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-inspector\", reference:\"50.0.2661.94-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-l10n\", reference:\"50.0.2661.94-1~deb8u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:41:09", "description": "The version of Google Chrome installed on the remote host is prior to 50.0.2661.94, and is affected by multiple vulnerabilities :\n\n - An out-of-bounds write error exists in Blink that allows a context-dependent attacker to execute arbitrary code. (CVE-2016-1660)\n - A flaw exists due to improper validation of user-supplied input when handling cross-process frames. A context-dependent attacker can exploit this to corrupt memory, resulting in the execution of arbitrary code. (CVE-2016-1661)\n - A use-after-free error exists in the extensions component. A context-dependent attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1662)\n - A use-after-free free error exists in Blink's V8 bindings. A context-dependent attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1663)\n - An unspecified flaw exists that allows a context-dependent attacker to spoof the address bar. (CVE-2016-1664)\n - An unspecified flaw exists in V8 that allows a context-dependent attacker to disclose sensitive information. (CVE-2016-1665)\n - Multiple unspecified vulnerabilities exist that allow a a context-dependent attacker to execute arbitrary code. (CVE-2016-1666)", "cvss3": {"score": null, "vector": null}, "published": "2016-06-16T00:00:00", "type": "nessus", "title": "Google Chrome < 50.0.2661.94 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"], "id": "9370.PASL", "href": "https://www.tenable.com/plugins/nnm/9370", "sourceData": "Binary data 9370.pasl", "cvss": {"score": 9.3, "vector": "CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:41:09", "description": "Chromium was updated to 51.0.2704.103 to fix three vulnerabilities :\n\n - CVE-2016-1704: Various fixes from internal audits, fuzzing and other initiatives (shared identifier) (boo#985397)\n\nIncludes vulnerability fixes from 50.0.2661.102 (boo#979859) :\n\n - CVE-2016-1667: Same origin bypass in DOM\n\n - CVE-2016-1668: Same origin bypass in Blink V8 bindings\n\n - CVE-2016-1669: Buffer overflow in V8\n\n - CVE-2016-1670: Race condition in loader\n\nIncludes vulnerability fixes from 50.0.2661.94 (boo#977830) :\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n\n - CVE-2016-1661: Memory corruption in cross-process frames\n\n - CVE-2016-1662: Use-after-free in extensions\n\n - CVE-2016-1663: Use-after-free in Blink’s V8 bindings\n\n - CVE-2016-1664: Address bar spoofing\n\n - CVE-2016-1665: Information leak in V8\n\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other initiatives", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-06-27T00:00:00", "type": "nessus", "title": "openSUSE Security Update : Chromium (openSUSE-2016-756)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1667", "CVE-2016-1668", "CVE-2016-1669", "CVE-2016-1670", "CVE-2016-1704"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium-desktop-kde", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "cpe:/o:novell:opensuse:13.1"], "id": "OPENSUSE-2016-756.NASL", "href": "https://www.tenable.com/plugins/nessus/91848", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-756.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91848);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\", \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\", \"CVE-2016-1667\", \"CVE-2016-1668\", \"CVE-2016-1669\", \"CVE-2016-1670\", \"CVE-2016-1704\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2016-756)\");\n script_summary(english:\"Check for the openSUSE-2016-756 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to 51.0.2704.103 to fix three vulnerabilities :\n\n - CVE-2016-1704: Various fixes from internal audits,\n fuzzing and other initiatives (shared identifier)\n (boo#985397)\n\nIncludes vulnerability fixes from 50.0.2661.102 (boo#979859) :\n\n - CVE-2016-1667: Same origin bypass in DOM\n\n - CVE-2016-1668: Same origin bypass in Blink V8 bindings\n\n - CVE-2016-1669: Buffer overflow in V8\n\n - CVE-2016-1670: Race condition in loader\n\nIncludes vulnerability fixes from 50.0.2661.94 (boo#977830) :\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n\n - CVE-2016-1661: Memory corruption in cross-process frames\n\n - CVE-2016-1662: Use-after-free in extensions\n\n - CVE-2016-1663: Use-after-free in Blink’s V8\n bindings\n\n - CVE-2016-1664: Address bar spoofing\n\n - CVE-2016-1665: Information leak in V8\n\n - CVE-2016-1666: Various fixes from internal audits,\n fuzzing and other initiatives\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=977830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=979859\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=985397\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-51.0.2704.103-147.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-debuginfo-51.0.2704.103-147.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-51.0.2704.103-147.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debuginfo-51.0.2704.103-147.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debugsource-51.0.2704.103-147.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-gnome-51.0.2704.103-147.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-kde-51.0.2704.103-147.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-51.0.2704.103-147.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-debuginfo-51.0.2704.103-147.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:41:44", "description": "An out of bounds write was discovered in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code. (CVE-2016-1660)\n\nIt was discovered that Blink assumes that a frame which passes same-origin checks is local in some cases. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code. (CVE-2016-1661)\n\nA use-after-free was discovered in the V8 bindings in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code. (CVE-2016-1663)\n\nIt was discovered that the JSGenericLowering class in V8 mishandles comparison operators. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information. (CVE-2016-1665)\n\nMultiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash or execute arbitrary code.\n(CVE-2016-1666)\n\nIt was discovered that the TreeScope::adoptIfNeeded function in Blink does not prevent script execution during node-adoption operations. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same origin restrictions. (CVE-2016-1667)\n\nIt was discovered that the forEachForBinding in the V8 bindings in Blink uses an improper creation context. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same origin restrictions. (CVE-2016-1668)\n\nA buffer overflow was discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code. (CVE-2016-1669)\n\nA race condition was discovered in ResourceDispatcherHostImpl in Chromium. An attacker could potentially exploit this to make arbitrary HTTP requests. (CVE-2016-1670).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-05-19T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS / 15.10 / 16.04 LTS : oxide-qt vulnerabilities (USN-2960-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1663", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1667", "CVE-2016-1668", "CVE-2016-1669", "CVE-2016-1670"], "modified": "2019-09-18T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:15.10", "cpe:/o:canonical:ubuntu_linux:16.04"], "id": "UBUNTU_USN-2960-1.NASL", "href": "https://www.tenable.com/plugins/nessus/91257", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2960-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(91257);\n script_version(\"2.12\");\n script_cvs_date(\"Date: 2019/09/18 12:31:45\");\n\n script_cve_id(\"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1663\", \"CVE-2016-1665\", \"CVE-2016-1666\", \"CVE-2016-1667\", \"CVE-2016-1668\", \"CVE-2016-1669\", \"CVE-2016-1670\");\n script_xref(name:\"USN\", value:\"2960-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 15.10 / 16.04 LTS : oxide-qt vulnerabilities (USN-2960-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An out of bounds write was discovered in Blink. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via renderer\ncrash, or execute arbitrary code. (CVE-2016-1660)\n\nIt was discovered that Blink assumes that a frame which passes\nsame-origin checks is local in some cases. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or\nexecute arbitrary code. (CVE-2016-1661)\n\nA use-after-free was discovered in the V8 bindings in Blink. If a user\nwere tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to cause a denial of service via\nrenderer crash, or execute arbitrary code. (CVE-2016-1663)\n\nIt was discovered that the JSGenericLowering class in V8 mishandles\ncomparison operators. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to obtain\nsensitive information. (CVE-2016-1665)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code.\n(CVE-2016-1666)\n\nIt was discovered that the TreeScope::adoptIfNeeded function in Blink\ndoes not prevent script execution during node-adoption operations. If\na user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to bypass same origin\nrestrictions. (CVE-2016-1667)\n\nIt was discovered that the forEachForBinding in the V8 bindings in\nBlink uses an improper creation context. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially\nexploit this to bypass same origin restrictions. (CVE-2016-1668)\n\nA buffer overflow was discovered in V8. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or\nexecute arbitrary code. (CVE-2016-1669)\n\nA race condition was discovered in ResourceDispatcherHostImpl in\nChromium. An attacker could potentially exploit this to make arbitrary\nHTTP requests. (CVE-2016-1670).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2960-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected liboxideqtcore0 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/05/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2016-2019 Canonical, Inc. / NASL script (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|15\\.10|16\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 15.10 / 16.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.14.9-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"15.10\", pkgname:\"liboxideqtcore0\", pkgver:\"1.14.9-0ubuntu0.15.10.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.14.9-0ubuntu0.16.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-04-03T14:39:09", "description": "The remote host is affected by the vulnerability described in GLSA-201605-02 (Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in the Chromium web browser. Please review the CVE identifiers referenced below for details.\n Impact :\n\n A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-05-17T00:00:00", "type": "nessus", "title": "GLSA-201605-02 : Chromium: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-1646", "CVE-2016-1647", "CVE-2016-1648", "CVE-2016-1649", "CVE-2016-1650", "CVE-2016-1651", "CVE-2016-1652", "CVE-2016-1653", "CVE-2016-1654", "CVE-2016-1655", "CVE-2016-1656", "CVE-2016-1657", "CVE-2016-1658", "CVE-2016-1659", "CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1667", "CVE-2016-1668", "CVE-2016-1669", "CVE-2016-1670", "CVE-2016-1671"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:chromium", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201605-02.NASL", "href": "https://www.tenable.com/plugins/nessus/91176", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201605-02.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91176);\n script_version(\"2.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-1646\", \"CVE-2016-1647\", \"CVE-2016-1648\", \"CVE-2016-1649\", \"CVE-2016-1650\", \"CVE-2016-1651\", \"CVE-2016-1652\", \"CVE-2016-1653\", \"CVE-2016-1654\", \"CVE-2016-1655\", \"CVE-2016-1656\", \"CVE-2016-1657\", \"CVE-2016-1658\", \"CVE-2016-1659\", \"CVE-2016-1660\", \"CVE-2016-1661\", \"CVE-2016-1662\", \"CVE-2016-1663\", \"CVE-2016-1664\", \"CVE-2016-1665\", \"CVE-2016-1666\", \"CVE-2016-1667\", \"CVE-2016-1668\", \"CVE-2016-1669\", \"CVE-2016-1670\", \"CVE-2016-1671\");\n script_xref(name:\"GLSA\", value:\"201605-02\");\n\n script_name(english:\"GLSA-201605-02 : Chromium: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201605-02\n(Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in the Chromium web\n browser. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, obtain\n sensitive information, or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201605-02\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/chromium-50.0.2661.102'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 50.0.2661.102\"), vulnerable:make_list(\"lt 50.0.2661.102\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "chrome": [{"lastseen": "2021-12-30T22:33:39", "description": "The stable channel has been updated to 50.0.2661.94 for Windows, Mac, and Linux.\n\n\n\n\n\nSecurity Fixes and Rewards \n\n\n\nNote: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed.\n\n** \n** \n\n\nThis update includes [9 security fixes](<https://bugs.chromium.org/p/chromium/issues/list?can=1&q=label%3ARelease-2-M50+type%3Dbug-security&colspec=ID+Pri+M+Stars+ReleaseBlock+Component+Status+Owner+Summary+OS+Modified&x=m&y=releaseblock&cells=ids>). Below, we highlight fixes that were contributed by external researchers. Please see the [Chromium security page](<http://sites.google.com/a/chromium.org/dev/Home/chromium-security>) for more information. \n\n** \n** \n\n\n[$3000][[574802](<https://crbug.com/574802>)] High CVE-2016-1660: Out-of-bounds write in Blink. Credit to Atte Kettunen of OUSPG.\n\n[$3000][[601629](<https://crbug.com/601629>)] High CVE-2016-1661: Memory corruption in cross-process frames. Credit to Wadih Matar.\n\n[$3000][[603732](<https://crbug.com/603732>)] High CVE-2016-1662: Use-after-free in extensions. Credit to Rob Wu.\n\n[$3000][[603987](<https://crbug.com/603987>)] High CVE-2016-1663: Use-after-free in Blink's V8 bindings. Credit to anonymous.\n\n[$1000][[597322](<https://crbug.com/597322>)] Medium CVE-2016-1664: Address bar spoofing. Credit to Wadih Matar.\n\n[$1000][[606181](<https://crbug.com/606181>)] Medium CVE-2016-1665: Information leak in V8. Credit to HyungSeok Han. \n[$n/a][[586820](<https://crbug.com/586820>)] **Low** CVE-2016-5168: Side channel information leak in Skia. Credit to Roeland Krak.\n\n** \n** \n\n\nWe would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. \n\n** \n** \n\n\nAs usual, our ongoing internal security work was responsible for a wide range of fixes:\n\n * [[607652](<https://crbug.com/607652>)] CVE-2016-1666: Various fixes from internal audits, fuzzing and other initiatives.\n\n\nMany of our security bugs are detected using [AddressSanitizer](<http://code.google.com/p/address-sanitizer/wiki/AddressSanitizer>), [MemorySanitizer](<https://code.google.com/p/memory-sanitizer/wiki/MemorySanitizer>), [Control Flow Integrity](<https://sites.google.com/a/chromium.org/dev/developers/testing/control-flow-integrity>) or [LibFuzzer](<https://sites.google.com/a/chromium.org/dev/developers/testing/libfuzzer>).\n\n\n\n\nA list of changes is available in the [log](<https://chromium.googlesource.com/chromium/src/+log/50.0.2661.86..50.0.2661.94?pretty=fuller&n=10000>). Interested in [switching](<http://www.chromium.org/getting-involved/dev-channel>) release channels? Find out [how](<http://www.chromium.org/getting-involved/dev-channel>). If you find a new issue, please let us know by [filing a bug](<http://crbug.com/>). The [community help forum](<https://productforums.google.com/forum/#!forum/chrome>) is also a great place to reach out for help or learn about common issues. \n** \n** \n\n\nKrishna Govind\n\nGoogle Chrome", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-04-28T00:00:00", "type": "chrome", "title": "Stable Channel Update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-5168"], "modified": "2016-04-28T00:00:00", "id": "GCSA-3936814140712444025", "href": "https://chromereleases.googleblog.com/2016/04/stable-channel-update_28.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:09:51", "description": "Chromium was updated to 50.0.2661.94 to fix a number of vulnerabilities\n (boo#977830):\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n - CVE-2016-1661: Memory corruption in cross-process frames\n - CVE-2016-1662: Use-after-free in extensions\n - CVE-2016-1663: Use-after-free in Blink\u00c3\u00a2\u00c2\u0080\u00c2\u0099s V8 bindings\n - CVE-2016-1664: Address bar spoofing\n - CVE-2016-1665: Information leak in V8\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other\n initiatives\n\n", "cvss3": {}, "published": "2016-05-04T00:08:11", "type": "suse", "title": "Security update for Chromium (important)", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2016-05-04T00:08:11", "id": "OPENSUSE-SU-2016:1209-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:46:49", "description": "Chromium was updated to 50.0.2661.94 to fix a number of vulnerabilities\n (boo#977830):\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n - CVE-2016-1661: Memory corruption in cross-process frames\n - CVE-2016-1662: Use-after-free in extensions\n - CVE-2016-1663: Use-after-free in Blink\u00c3\u00a2\u00c2\u0080\u00c2\u0099s V8 bindings\n - CVE-2016-1664: Address bar spoofing\n - CVE-2016-1665: Information leak in V8\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other\n initiatives\n\n", "cvss3": {}, "published": "2016-05-04T00:07:46", "type": "suse", "title": "Security update for Chromium (important)", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2016-05-04T00:07:46", "id": "OPENSUSE-SU-2016:1207-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:27:16", "description": "Chromium was updated to 50.0.2661.94 to fix a number of vulnerabilities\n (boo#977830):\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n - CVE-2016-1661: Memory corruption in cross-process frames\n - CVE-2016-1662: Use-after-free in extensions\n - CVE-2016-1663: Use-after-free in Blink\u00c3\u00a2\u00c2\u0080\u00c2\u0099s V8 bindings\n - CVE-2016-1664: Address bar spoofing\n - CVE-2016-1665: Information leak in V8\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other\n initiatives\n\n", "cvss3": {}, "published": "2016-05-04T00:07:58", "type": "suse", "title": "Security update for Chromium (important)", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2016-05-04T00:07:58", "id": "OPENSUSE-SU-2016:1208-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:22:07", "description": "Chromium was updated to 51.0.2704.103 to fix three vulnerabilities:\n\n - CVE-2016-1704: Various fixes from internal audits, fuzzing and other\n initiatives (shared identifier) (boo#985397)\n\n Includes vulnerability fixes from 50.0.2661.102 (boo#979859):\n\n - CVE-2016-1667: Same origin bypass in DOM\n - CVE-2016-1668: Same origin bypass in Blink V8 bindings\n - CVE-2016-1669: Buffer overflow in V8\n - CVE-2016-1670: Race condition in loader\n\n Includes vulnerability fixes from 50.0.2661.94 (boo#977830):\n\n - CVE-2016-1660: Out-of-bounds write in Blink\n - CVE-2016-1661: Memory corruption in cross-process frames\n - CVE-2016-1662: Use-after-free in extensions\n - CVE-2016-1663: Use-after-free in Blink\u00c3\u00a2\u00c2\u0080\u00c2\u0099s V8 bindings\n - CVE-2016-1664: Address bar spoofing\n - CVE-2016-1665: Information leak in V8\n - CVE-2016-1666: Various fixes from internal audits, fuzzing and other\n initiatives\n\n", "cvss3": {}, "published": "2016-06-22T15:16:20", "type": "suse", "title": "Security update for Chromium (important)", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2016-1667", "CVE-2016-1665", "CVE-2016-1668", "CVE-2016-1669", "CVE-2016-1666", "CVE-2016-1704", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1670", "CVE-2016-1660"], "modified": "2016-06-22T15:16:20", "id": "OPENSUSE-SU-2016:1655-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "threatpost": [{"lastseen": "2018-10-06T22:55:25", "description": "Google updated its browser Thursday patching nine security bugs, labeling four as \u201chigh\u201d and two as a \u201cmedium\u201d risk to computer users. The update was tied to a new Chrome browser build (50.0.2661.94) that fixes the flaws.\n\nGoogle also shelled out $14,000 tied to bug bounty payouts addressed in this security updates, according to a [Google Chrome Team security bulletin](<http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html>).\n\nDetails are scant on the actual security flaws. That\u2019s because Google says it needs to keep information about the bugs restricted until a majority of browsers are updated. \u201cWe will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven\u2019t yet fixed,\u201d it wrote.\n\nFive Chrome bug bounty hunters split the $14,000 in rewards. Four $3,000 payments went to those that discovered \u201chigh\u201d risk browser vulnerabilities.\n\nSecurity researcher Atte Kettunen, with the University of Oulu Finland, earned $3,000 for discovering an \u201cout-of-bounds write in Blink\u201d vulnerability (CVE-2016-1660).\n\nIndependent security consultant Wadih Matar also earned $3,000 for his discovery of a \u201cMemory corruption in cross-process frames\u201d (CVE-2016-1661) security bug in Chrome. Matar earned an additional $1,000 for the \u201cmedium\u201d security bug (CVE-2016-1664) fixing an \u201caddress bar spoofing\u201d issue.\n\nRob Wu, a software science student at the Eindhoven University of Technology, also earned $3,000 for his discovery of a \u201cuse-after-free in extensions\u201d security flaw (CVE-2016-1662) found in Chrome.\n\nGoogle also paid $3,000 to an anonymous researcher that discovered a security flaw (CVE-2016-1663) that was only described as \u201cuse-after-free in Blink\u2019s V8 bindings.\u201d\n\nOther bug bounty payouts went to \u201cgksgudtjr456\u201d who received $1,000 for a \u201cmedium\u201d risk (CVE-2016-1665) \u201cinformation leak in V8\u201d security flaw.\n\nGoogle fixed an additional three security bugs (CVE-2016-1666) that included \u201cvarious fixes from internal audits, fuzzing and other initiatives.\u201d\n", "cvss3": {}, "published": "2016-04-29T13:24:25", "type": "threatpost", "title": "Google Patches 9 Security Flaws in New Chrome Browser Build", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2016-04-29T17:24:25", "id": "THREATPOST:A2F130EE78FC04CA75C21282287E3B83", "href": "https://threatpost.com/google-patches-9-security-flaws-in-new-chrome-browser-build/117747/", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2022-01-19T15:51:32", "description": "\n\nGoogle Chrome Releases reports:\n\n9 security fixes in this release, including:\n\n[574802] High CVE-2016-1660: Out-of-bounds write in Blink.\n\t Credit to Atte Kettunen of OUSPG.\n[601629] High CVE-2016-1661: Memory corruption in cross-process\n\t frames. Credit to Wadih Matar.\n[603732] High CVE-2016-1662: Use-after-free in extensions.\n\t Credit to Rob Wu.\n[603987] High CVE-2016-1663: Use-after-free in Blink's V8\n\t bindings. Credit to anonymous.\n[597322] Medium CVE-2016-1664: Address bar spoofing. Credit to\n\t Wadih Matar.\n[606181] Medium CVE-2016-1665: Information leak in V8. Credit\n\t to HyungSeok Han.\n[607652] CVE-2016-1666: Various fixes from internal audits,\n\t fuzzing and other initiatives.\n\n\n\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-04-28T00:00:00", "type": "freebsd", "title": "chromium -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2016-04-28T00:00:00", "id": "7DA1DA96-24BB-11E6-BD31-3065EC8FD3EC", "href": "https://vuxml.freebsd.org/freebsd/7da1da96-24bb-11e6-bd31-3065ec8fd3ec.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "archlinux": [{"lastseen": "2016-09-02T18:44:46", "description": "- CVE-2016-1660:\n\nOut-of-bounds write in Blink. Credit to Atte Kettunen of OUSPG.\n\n- CVE-2016-1661:\n\nMemory corruption in cross-process frames. Credit to Wadih Matar.\n\n- CVE-2016-1662:\n\nUse-after-free in extensions. Credit to Rob Wu.\n\n- CVE-2016-1663:\n\nUse-after-free in Blink's V8 bindings. Credit to anonymous.\n\n- CVE-2016-1664:\n\nAddress bar spoofing. Credit to Wadih Matar.\n\n- CVE-2016-1665:\n\nInformation leak in V8. Credit to HyungSeok Han.\n\n- CVE-2016-1666:\n\nVarious fixes from internal audits, fuzzing and other initiatives.", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-05T00:00:00", "type": "archlinux", "title": "chromium: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1663", "CVE-2016-1661", "CVE-2016-1664", "CVE-2016-1662", "CVE-2016-1660"], "modified": "2016-05-05T00:00:00", "id": "ASA-201605-7", "href": "https://lists.archlinux.org/pipermail/arch-security/2016-May/000614.html", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2021-10-21T22:15:17", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3564-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nMay 02, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2016-1660 CVE-2016-1661 CVE-2016-1662 CVE-2016-1663\n CVE-2016-1664 CVE-2016-1665 CVE-2016-1666\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2016-1660\n\n Atte Kettunen discovered an out-of-bounds write issue.\n\nCVE-2016-1661\n\n Wadih Matar discovered a memory corruption issue.\n\nCVE-2016-1662\n\n Rob Wu discovered a use-after-free issue related to extensions.\n\nCVE-2016-1663\n\n A use-after-free issue was discovered in Blink's bindings to V8.\n\nCVE-2016-1664\n\n Wadih Matar discovered a way to spoof URLs.\n\nCVE-2016-1665\n\n gksgudtjr456 discovered an information leak in the v8 javascript\n library.\n\nCVE-2016-1666\n\n The chrome development team found and fixed various issues during\n internal auditing.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 50.0.2661.94-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 50.0.2661.94-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-02T12:27:18", "type": "debian", "title": "[SECURITY] [DSA 3564-1] chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2016-05-02T12:27:18", "id": "DEBIAN:DSA-3564-1:38927", "href": "https://lists.debian.org/debian-security-announce/2016/msg00140.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-11-29T22:49:15", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3564-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nMay 02, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2016-1660 CVE-2016-1661 CVE-2016-1662 CVE-2016-1663\n CVE-2016-1664 CVE-2016-1665 CVE-2016-1666\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2016-1660\n\n Atte Kettunen discovered an out-of-bounds write issue.\n\nCVE-2016-1661\n\n Wadih Matar discovered a memory corruption issue.\n\nCVE-2016-1662\n\n Rob Wu discovered a use-after-free issue related to extensions.\n\nCVE-2016-1663\n\n A use-after-free issue was discovered in Blink's bindings to V8.\n\nCVE-2016-1664\n\n Wadih Matar discovered a way to spoof URLs.\n\nCVE-2016-1665\n\n gksgudtjr456 discovered an information leak in the v8 javascript\n library.\n\nCVE-2016-1666\n\n The chrome development team found and fixed various issues during\n internal auditing.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 50.0.2661.94-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 50.0.2661.94-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-02T12:27:18", "type": "debian", "title": "[SECURITY] [DSA 3564-1] chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2016-05-02T12:27:18", "id": "DEBIAN:DSA-3564-1:520F5", "href": "https://lists.debian.org/debian-security-announce/2016/msg00140.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2021-10-19T20:37:38", "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 50.0.2661.94.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1660, CVE-2016-1661, CVE-2016-1662, CVE-2016-1663, CVE-2016-1666, CVE-2016-1664, CVE-2016-1665)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-02T12:16:20", "type": "redhat", "title": "(RHSA-2016:0707) Important: chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2018-06-07T05:04:21", "id": "RHSA-2016:0707", "href": "https://access.redhat.com/errata/RHSA-2016:0707", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2021-12-23T00:13:06", "description": "### *Detect date*:\n04/28/2016\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions and obtain sensitive information.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 50.0.2661.94 (All branches)\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Google Chrome](<https://www.google.com/chrome/browser/desktop/index.html>)\n\n### *Original advisories*:\n[Google Chrome relaease blog post](<http://googlechromereleases.blogspot.ru/2016/04/stable-channel-update_28.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+GoogleChromeReleases+\\(Google+Chrome+Releases\\)>) \n\n\n### *Impacts*:\nOSI \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2016-1666](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666>)7.5Critical \n[CVE-2016-1665](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665>)4.3Warning \n[CVE-2016-1664](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664>)4.3Warning \n[CVE-2016-1663](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663>)6.8High \n[CVE-2016-1661](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661>)8.3Critical \n[CVE-2016-1660](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660>)6.8High \n[CVE-2016-5168](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5168>)5.0Critical", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-04-28T00:00:00", "type": "kaspersky", "title": "KLA10799 Multiple vulnerabilities in Google Chrome", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "baseScore": 8.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 8.5, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-5168"], "modified": "2020-06-03T00:00:00", "id": "KLA10799", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10799/", "cvss": {"score": 8.3, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:C"}}], "mageia": [{"lastseen": "2022-04-18T11:19:34", "description": "Chromium-browser-stable 50.0.2661.94 fixes several security issues: an out-of-bounds write problem in Blink (CVE-2016-1660), memory corruption in cross-process frames (CVE-2016-1661), use-after-free bugs in extensions (CVE-2016-1662) and in Blink's V8 bindings (CVE-2016-1663), an address bar spoofing vulnerability (CVE-2016-1664), an information leak in V8 (CVE-2016-1665), and various fixes from upstream's internal audits, fuzzing, and other initiatives (CVE-2015-1666). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2016-04-29T17:21:35", "type": "mageia", "title": "Updated chromium-browser-stable packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1666", "CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666"], "modified": "2016-04-29T17:21:35", "id": "MGASA-2016-0160", "href": "https://advisories.mageia.org/MGASA-2016-0160.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2022-01-04T12:27:21", "description": "An out of bounds write was discovered in Blink. If a user were tricked in \nto opening a specially crafted website, an attacker could potentially \nexploit this to cause a denial of service via renderer crash, or execute \narbitrary code. (CVE-2016-1660)\n\nIt was discovered that Blink assumes that a frame which passes same-origin \nchecks is local in some cases. If a user were tricked in to opening a \nspecially crafted website, an attacker could potentially exploit this to \ncause a denial of service via renderer crash, or execute arbitrary code. \n(CVE-2016-1661)\n\nA use-after-free was discovered in the V8 bindings in Blink. If a user \nwere tricked in to opening a specially crafted website, an attacker could \npotentially exploit this to cause a denial of service via renderer crash, \nor execute arbitrary code. (CVE-2016-1663)\n\nIt was discovered that the JSGenericLowering class in V8 mishandles \ncomparison operators. If a user were tricked in to opening a specially \ncrafted website, an attacker could potentially exploit this to obtain \nsensitive information. (CVE-2016-1665)\n\nMultiple security issues were discovered in Chromium. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to read uninitialized memory, cause a denial \nof service via application crash or execute arbitrary code. \n(CVE-2016-1666)\n\nIt was discovered that the TreeScope::adoptIfNeeded function in Blink \ndoes not prevent script execution during node-adoption operations. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to bypass same origin restrictions. \n(CVE-2016-1667)\n\nIt was discovered that the forEachForBinding in the V8 bindings in Blink \nuses an improper creation context. If a user were tricked in to opening a \nspecially crafted website, an attacker could potentially exploit this to \nbypass same origin restrictions. (CVE-2016-1668)\n\nA buffer overflow was discovered in V8. If a user were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to cause a denial of service via renderer crash, or execute arbitrary \ncode. (CVE-2016-1669)\n\nA race condition was discovered in ResourceDispatcherHostImpl in Chromium. \nAn attacker could potentially exploit this to make arbitrary HTTP \nrequests. (CVE-2016-1670)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-18T00:00:00", "type": "ubuntu", "title": "Oxide vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1667", "CVE-2016-1669", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1660", "CVE-2016-1663", "CVE-2016-1670", "CVE-2016-1668", "CVE-2016-1661"], "modified": "2016-05-18T00:00:00", "id": "USN-2960-1", "href": "https://ubuntu.com/security/notices/USN-2960-1", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2022-01-17T19:06:37", "description": "### Background\n\nChromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. \n\n### Description\n\nMultiple vulnerabilities have been discovered in the Chromium web browser. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/chromium-50.0.2661.102\"", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-14T00:00:00", "type": "gentoo", "title": "Chromium: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1646", "CVE-2016-1647", "CVE-2016-1648", "CVE-2016-1649", "CVE-2016-1650", "CVE-2016-1651", "CVE-2016-1652", "CVE-2016-1653", "CVE-2016-1654", "CVE-2016-1655", "CVE-2016-1656", "CVE-2016-1657", "CVE-2016-1658", "CVE-2016-1659", "CVE-2016-1660", "CVE-2016-1661", "CVE-2016-1662", "CVE-2016-1663", "CVE-2016-1664", "CVE-2016-1665", "CVE-2016-1666", "CVE-2016-1667", "CVE-2016-1668", "CVE-2016-1669", "CVE-2016-1670", "CVE-2016-1671"], "modified": "2016-05-14T00:00:00", "id": "GLSA-201605-02", "href": "https://security.gentoo.org/glsa/201605-02", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2022-03-23T12:49:43", "description": "extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94 does not prevent fallback execution once the Garbage Collection callback has started, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "cve", "title": "CVE-2016-1662", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1662"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_server_supplementary_eus:6.7z", "cpe:/a:google:chrome:50.0.2661.87", "cpe:/o:redhat:enterprise_linux_server_supplementary:6.0", "cpe:/o:opensuse:opensuse:13.1", "cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0"], "id": "CVE-2016-1662", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1662", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:50.0.2661.87:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:50:07", "description": "The SerializedScriptValue::transferArrayBuffers function in WebKit/Source/bindings/core/v8/SerializedScriptValue.cpp in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.94, mishandles certain array-buffer data structures, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "cve", "title": "CVE-2016-1663", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1663"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_server_supplementary_eus:6.7z", "cpe:/a:google:chrome:50.0.2661.87", "cpe:/o:redhat:enterprise_linux_server_supplementary:6.0", "cpe:/o:opensuse:opensuse:13.1", "cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0"], "id": "CVE-2016-1663", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1663", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:50.0.2661.87:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:22:48", "description": "Skia, as used in Google Chrome before 50.0.2661.94, allows remote attackers to bypass the Same Origin Policy and obtain sensitive information.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-04-21T20:59:00", "type": "cve", "title": "CVE-2016-5168", "cwe": ["CWE-346"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5168"], "modified": "2017-04-27T13:20:00", "cpe": ["cpe:/a:google:chrome:50.0.2661.91"], "id": "CVE-2016-5168", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5168", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:google:chrome:50.0.2661.91:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:49:40", "description": "Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.0, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "cve", "title": "CVE-2016-1661", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "baseScore": 8.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 8.5, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1661"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_server_supplementary_eus:6.7z", "cpe:/a:google:chrome:50.0.2661.87", "cpe:/o:redhat:enterprise_linux_server_supplementary:6.0", "cpe:/o:opensuse:opensuse:13.1", "cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0"], "id": "CVE-2016-1661", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1661", "cvss": {"score": 8.3, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:C"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:50.0.2661.87:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:49:47", "description": "The JSGenericLowering class in compiler/js-generic-lowering.cc in Google V8, as used in Google Chrome before 50.0.2661.94, mishandles comparison operators, which allows remote attackers to obtain sensitive information via crafted JavaScript code.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2016-05-14T21:59:00", "type": "cve", "title": "CVE-2016-1665", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1665"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_server_supplementary_eus:6.7z", "cpe:/a:google:chrome:50.0.2661.87", "cpe:/o:redhat:enterprise_linux_server_supplementary:6.0", "cpe:/o:opensuse:opensuse:13.1", "cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0"], "id": "CVE-2016-1665", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1665", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:50.0.2661.87:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:49:49", "description": "Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "cve", "title": "CVE-2016-1666", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1666"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_server_supplementary_eus:6.7z", "cpe:/a:google:chrome:50.0.2661.87", "cpe:/o:redhat:enterprise_linux_server_supplementary:6.0", "cpe:/o:opensuse:opensuse:13.1", "cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0"], "id": "CVE-2016-1666", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1666", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:50.0.2661.87:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:49:35", "description": "Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray and WTF::double_conversion::Vector classes, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted web site.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "cve", "title": "CVE-2016-1660", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1660"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_server_supplementary_eus:6.7z", "cpe:/a:google:chrome:50.0.2661.87", "cpe:/o:redhat:enterprise_linux_server_supplementary:6.0", "cpe:/o:opensuse:opensuse:13.1", "cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0"], "id": "CVE-2016-1660", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1660", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:50.0.2661.87:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:49:45", "description": "The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2016-05-14T21:59:00", "type": "cve", "title": "CVE-2016-1664", "cwe": ["CWE-254"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1664"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_server_supplementary_eus:6.7z", "cpe:/a:google:chrome:50.0.2661.87", "cpe:/o:redhat:enterprise_linux_server_supplementary:6.0", "cpe:/o:opensuse:opensuse:13.1", "cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0"], "id": "CVE-2016-1664", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1664", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:50.0.2661.87:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"]}], "ubuntucve": [{"lastseen": "2021-11-22T21:46:53", "description": "extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94\ndoes not prevent fallback execution once the Garbage Collection callback\nhas started, which allows remote attackers to cause a denial of service\n(use-after-free) or possibly have unspecified other impact via unknown\nvectors.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-14T00:00:00", "type": "ubuntucve", "title": "CVE-2016-1662", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1662"], "modified": "2016-05-14T00:00:00", "id": "UB:CVE-2016-1662", "href": "https://ubuntu.com/security/CVE-2016-1662", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-11-22T21:47:11", "description": "The SerializedScriptValue::transferArrayBuffers function in\nWebKit/Source/bindings/core/v8/SerializedScriptValue.cpp in the V8 bindings\nin Blink, as used in Google Chrome before 50.0.2661.94, mishandles certain\narray-buffer data structures, which allows remote attackers to cause a\ndenial of service (use-after-free) or possibly have unspecified other\nimpact via a crafted web site.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-04-29T00:00:00", "type": "ubuntucve", "title": "CVE-2016-1663", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1663"], "modified": "2016-04-29T00:00:00", "id": "UB:CVE-2016-1663", "href": "https://ubuntu.com/security/CVE-2016-1663", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:42:26", "description": "Skia, as used in Google Chrome before 50.0.2661.94, allows remote attackers\nto bypass the Same Origin Policy and obtain sensitive information.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-04-21T00:00:00", "type": "ubuntucve", "title": "CVE-2016-5168", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5168"], "modified": "2017-04-21T00:00:00", "id": "UB:CVE-2016-5168", "href": "https://ubuntu.com/security/CVE-2016-5168", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-11-22T21:47:11", "description": "Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that\nframes satisfy a check for the same renderer process in addition to a Same\nOrigin Policy check, which allows remote attackers to cause a denial of\nservice (memory corruption) or possibly have unspecified other impact via a\ncrafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.0, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-04-29T00:00:00", "type": "ubuntucve", "title": "CVE-2016-1661", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "baseScore": 8.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 8.5, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1661"], "modified": "2016-04-29T00:00:00", "id": "UB:CVE-2016-1661", "href": "https://ubuntu.com/security/CVE-2016-1661", "cvss": {"score": 8.3, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:C"}}, {"lastseen": "2021-11-22T21:47:12", "description": "The JSGenericLowering class in compiler/js-generic-lowering.cc in Google\nV8, as used in Google Chrome before 50.0.2661.94, mishandles comparison\noperators, which allows remote attackers to obtain sensitive information\nvia crafted JavaScript code.\n\n#### Notes\n\nAuthor| Note \n---|--- \n[mikesalvatore](<https://launchpad.net/~mikesalvatore>) | The Ubuntu Security Team does not support libv8\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2016-04-29T00:00:00", "type": "ubuntucve", "title": "CVE-2016-1665", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1665"], "modified": "2016-04-29T00:00:00", "id": "UB:CVE-2016-1665", "href": "https://ubuntu.com/security/CVE-2016-1665", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-11-22T21:47:12", "description": "Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions\nin the WTF::BitArray and WTF::double_conversion::Vector classes, which\nallows remote attackers to cause a denial of service (out-of-bounds write)\nor possibly have unspecified other impact via a crafted web site.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-04-29T00:00:00", "type": "ubuntucve", "title": "CVE-2016-1660", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1660"], "modified": "2016-04-29T00:00:00", "id": "UB:CVE-2016-1660", "href": "https://ubuntu.com/security/CVE-2016-1660", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:47:12", "description": "Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94\nallow attackers to cause a denial of service or possibly have other impact\nvia unknown vectors.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-04-29T00:00:00", "type": "ubuntucve", "title": "CVE-2016-1666", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1666"], "modified": "2016-04-29T00:00:00", "id": "UB:CVE-2016-1666", "href": "https://ubuntu.com/security/CVE-2016-1666", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:46:52", "description": "The HistoryController::UpdateForCommit function in\ncontent/renderer/history_controller.cc in Google Chrome before 50.0.2661.94\nmishandles the interaction between subframe forward navigations and other\nforward navigations, which allows remote attackers to spoof the address bar\nvia a crafted web site.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 4.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 1.4}, "published": "2016-05-14T00:00:00", "type": "ubuntucve", "title": "CVE-2016-1664", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1664"], "modified": "2016-05-14T00:00:00", "id": "UB:CVE-2016-1664", "href": "https://ubuntu.com/security/CVE-2016-1664", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "debiancve": [{"lastseen": "2021-12-14T17:47:14", "description": "extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94 does not prevent fallback execution once the Garbage Collection callback has started, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "debiancve", "title": "CVE-2016-1662", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1662"], "modified": "2016-05-14T21:59:00", "id": "DEBIANCVE:CVE-2016-1662", "href": "https://security-tracker.debian.org/tracker/CVE-2016-1662", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-14T17:47:14", "description": "The SerializedScriptValue::transferArrayBuffers function in WebKit/Source/bindings/core/v8/SerializedScriptValue.cpp in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.94, mishandles certain array-buffer data structures, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "debiancve", "title": "CVE-2016-1663", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1663"], "modified": "2016-05-14T21:59:00", "id": "DEBIANCVE:CVE-2016-1663", "href": "https://security-tracker.debian.org/tracker/CVE-2016-1663", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Skia, as used in Google Chrome before 50.0.2661.94, allows remote attackers to bypass the Same Origin Policy and obtain sensitive information.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-04-21T20:59:00", "type": "debiancve", "title": "CVE-2016-5168", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5168"], "modified": "2017-04-21T20:59:00", "id": "DEBIANCVE:CVE-2016-5168", "href": "https://security-tracker.debian.org/tracker/CVE-2016-5168", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.0, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "debiancve", "title": "CVE-2016-1661", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "baseScore": 8.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 8.5, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1661"], "modified": "2016-05-14T21:59:00", "id": "DEBIANCVE:CVE-2016-1661", "href": "https://security-tracker.debian.org/tracker/CVE-2016-1661", "cvss": {"score": 8.3, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:C"}}, {"lastseen": "2021-12-14T17:47:14", "description": "The JSGenericLowering class in compiler/js-generic-lowering.cc in Google V8, as used in Google Chrome before 50.0.2661.94, mishandles comparison operators, which allows remote attackers to obtain sensitive information via crafted JavaScript code.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2016-05-14T21:59:00", "type": "debiancve", "title": "CVE-2016-1665", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1665"], "modified": "2016-05-14T21:59:00", "id": "DEBIANCVE:CVE-2016-1665", "href": "https://security-tracker.debian.org/tracker/CVE-2016-1665", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "debiancve", "title": "CVE-2016-1666", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1666"], "modified": "2016-05-14T21:59:00", "id": "DEBIANCVE:CVE-2016-1666", "href": "https://security-tracker.debian.org/tracker/CVE-2016-1666", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray and WTF::double_conversion::Vector classes, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted web site.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-05-14T21:59:00", "type": "debiancve", "title": "CVE-2016-1660", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1660"], "modified": "2016-05-14T21:59:00", "id": "DEBIANCVE:CVE-2016-1660", "href": "https://security-tracker.debian.org/tracker/CVE-2016-1660", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 4.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 1.4}, "published": "2016-05-14T21:59:00", "type": "debiancve", "title": "CVE-2016-1664", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1664"], "modified": "2016-05-14T21:59:00", "id": "DEBIANCVE:CVE-2016-1664", "href": "https://security-tracker.debian.org/tracker/CVE-2016-1664", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}