CVE-2016-5172

The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-1905.html - () http://rhn.redhat.com/errata/RHSA-2016-1905.html -
References () http://www.debian.org/security/2016/dsa-3667 - () http://www.debian.org/security/2016/dsa-3667 -
References () http://www.securityfocus.com/bid/92942 - () http://www.securityfocus.com/bid/92942 -
References () http://www.securitytracker.com/id/1036826 - () http://www.securitytracker.com/id/1036826 -
References () https://codereview.chromium.org/2077283004 - () https://codereview.chromium.org/2077283004 -
References () https://crbug.com/616386 - () https://crbug.com/616386 -
References () https://googlechromereleases.blogspot.com/2016/09/stable-channel-update-for-desktop_13.html - () https://googlechromereleases.blogspot.com/2016/09/stable-channel-update-for-desktop_13.html -
References () https://security.gentoo.org/glsa/201610-09 - () https://security.gentoo.org/glsa/201610-09 -

07 Nov 2023, 02:33

Type Values Removed Values Added
References (DEBIAN) http://www.debian.org/security/2016/dsa-3667 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3667 -
References (BID) http://www.securityfocus.com/bid/92942 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92942 -
References (CONFIRM) https://crbug.com/616386 - Permissions Required () https://crbug.com/616386 -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-1905.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-1905.html -
References (GENTOO) https://security.gentoo.org/glsa/201610-09 - Third Party Advisory () https://security.gentoo.org/glsa/201610-09 -
References (CONFIRM) https://googlechromereleases.blogspot.com/2016/09/stable-channel-update-for-desktop_13.html - Vendor Advisory () https://googlechromereleases.blogspot.com/2016/09/stable-channel-update-for-desktop_13.html -
References (CONFIRM) https://codereview.chromium.org/2077283004 - Issue Tracking, Patch () https://codereview.chromium.org/2077283004 -
References (SECTRACK) http://www.securitytracker.com/id/1036826 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1036826 -

Information

Published : 2016-09-25 20:59

Updated : 2024-11-21 02:53


NVD link : CVE-2016-5172

Mitre link : CVE-2016-5172

CVE.ORG link : CVE-2016-5172


JSON object : View

Products Affected

nodejs

  • node.js

google

  • chrome

debian

  • debian_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor