CVE-2016-5198

V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2016-2672.html Third Party Advisory
http://www.securityfocus.com/bid/94079 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037224 Broken Link Third Party Advisory VDB Entry
https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html Release Notes Vendor Advisory
https://crbug.com/659475 Exploit Issue Tracking
http://rhn.redhat.com/errata/RHSA-2016-2672.html Third Party Advisory
http://www.securityfocus.com/bid/94079 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037224 Broken Link Third Party Advisory VDB Entry
https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html Release Notes Vendor Advisory
https://crbug.com/659475 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2672.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2672.html - Third Party Advisory
References () http://www.securityfocus.com/bid/94079 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94079 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037224 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1037224 - Broken Link, Third Party Advisory, VDB Entry
References () https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html - Release Notes, Vendor Advisory () https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html - Release Notes, Vendor Advisory
References () https://crbug.com/659475 - Exploit, Issue Tracking () https://crbug.com/659475 - Exploit, Issue Tracking

28 Jun 2024, 14:19

Type Values Removed Values Added
First Time Google android
Microsoft
Redhat enterprise Linux Workstation
Linux
Redhat
Redhat enterprise Linux Server
Apple macos
Redhat enterprise Linux Desktop
Microsoft windows
Apple
Linux linux Kernel
CPE cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
References () http://rhn.redhat.com/errata/RHSA-2016-2672.html - () http://rhn.redhat.com/errata/RHSA-2016-2672.html - Third Party Advisory
References () http://www.securityfocus.com/bid/94079 - () http://www.securityfocus.com/bid/94079 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037224 - () http://www.securitytracker.com/id/1037224 - Broken Link, Third Party Advisory, VDB Entry
References () https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html - () https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html - Release Notes, Vendor Advisory
References () https://crbug.com/659475 - () https://crbug.com/659475 - Exploit, Issue Tracking

07 Nov 2023, 02:33

Type Values Removed Values Added
References (SECTRACK) http://www.securitytracker.com/id/1037224 - () http://www.securitytracker.com/id/1037224 -
References (CONFIRM) https://crbug.com/659475 - () https://crbug.com/659475 -
References (CONFIRM) https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html - () https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html -
References (BID) http://www.securityfocus.com/bid/94079 - () http://www.securityfocus.com/bid/94079 -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2672.html - () http://rhn.redhat.com/errata/RHSA-2016-2672.html -

Information

Published : 2017-01-19 05:59

Updated : 2024-11-21 02:53


NVD link : CVE-2016-5198

Mitre link : CVE-2016-5198

CVE.ORG link : CVE-2016-5198


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_server
  • enterprise_linux_desktop

apple

  • macos

linux

  • linux_kernel

google

  • android
  • chrome

microsoft

  • windows
CWE
CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write