CVE-2016-1675

Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html - () http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html - () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html - () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html -
References () http://www.debian.org/security/2016/dsa-3590 - () http://www.debian.org/security/2016/dsa-3590 -
References () http://www.securityfocus.com/bid/90876 - () http://www.securityfocus.com/bid/90876 -
References () http://www.securitytracker.com/id/1035981 - () http://www.securitytracker.com/id/1035981 -
References () http://www.ubuntu.com/usn/USN-2992-1 - () http://www.ubuntu.com/usn/USN-2992-1 -
References () https://access.redhat.com/errata/RHSA-2016:1190 - () https://access.redhat.com/errata/RHSA-2016:1190 -
References () https://codereview.chromium.org/1858833003 - () https://codereview.chromium.org/1858833003 -
References () https://crbug.com/600182 - () https://crbug.com/600182 -
References () https://security.gentoo.org/glsa/201607-07 - () https://security.gentoo.org/glsa/201607-07 -

07 Nov 2023, 02:30

Type Values Removed Values Added
References (SECTRACK) http://www.securitytracker.com/id/1035981 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1035981 -
References (DEBIAN) http://www.debian.org/security/2016/dsa-3590 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3590 -
References (CONFIRM) https://crbug.com/600182 - Permissions Required () https://crbug.com/600182 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html -
References (BID) http://www.securityfocus.com/bid/90876 - () http://www.securityfocus.com/bid/90876 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html -
References (UBUNTU) http://www.ubuntu.com/usn/USN-2992-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2992-1 -
References (GENTOO) https://security.gentoo.org/glsa/201607-07 - () https://security.gentoo.org/glsa/201607-07 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html -
References (CONFIRM) https://codereview.chromium.org/1858833003 - Issue Tracking () https://codereview.chromium.org/1858833003 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html -
References (REDHAT) https://access.redhat.com/errata/RHSA-2016:1190 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1190 -

Information

Published : 2016-06-05 23:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1675

Mitre link : CVE-2016-1675

CVE.ORG link : CVE-2016-1675


JSON object : View

Products Affected

opensuse

  • opensuse
  • leap

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_workstation

google

  • chrome

canonical

  • ubuntu_linux

suse

  • linux_enterprise

debian

  • debian_linux
CWE
CWE-284

Improper Access Control