CVE-2016-1697

The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html - () http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html -
References () http://www.debian.org/security/2016/dsa-3594 - () http://www.debian.org/security/2016/dsa-3594 -
References () http://www.securitytracker.com/id/1036026 - () http://www.securitytracker.com/id/1036026 -
References () http://www.ubuntu.com/usn/USN-2992-1 - () http://www.ubuntu.com/usn/USN-2992-1 -
References () https://access.redhat.com/errata/RHSA-2016:1201 - () https://access.redhat.com/errata/RHSA-2016:1201 -
References () https://codereview.chromium.org/2021373003 - () https://codereview.chromium.org/2021373003 -
References () https://crbug.com/613266 - () https://crbug.com/613266 -

07 Nov 2023, 02:30

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html -
References (REDHAT) https://access.redhat.com/errata/RHSA-2016:1201 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1201 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html -
References (CONFIRM) http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html -
References (DEBIAN) http://www.debian.org/security/2016/dsa-3594 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3594 -
References (SECTRACK) http://www.securitytracker.com/id/1036026 - Third Party Advisory () http://www.securitytracker.com/id/1036026 -
References (UBUNTU) http://www.ubuntu.com/usn/USN-2992-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2992-1 -
References (CONFIRM) https://crbug.com/613266 - Permissions Required () https://crbug.com/613266 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html -
References (CONFIRM) https://codereview.chromium.org/2021373003 - Issue Tracking () https://codereview.chromium.org/2021373003 -

Information

Published : 2016-06-05 23:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1697

Mitre link : CVE-2016-1697

CVE.ORG link : CVE-2016-1697


JSON object : View

Products Affected

opensuse

  • opensuse
  • leap

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_workstation

google

  • chrome

canonical

  • ubuntu_linux

suse

  • linux_enterprise

debian

  • debian_linux
CWE
CWE-284

Improper Access Control