CVE-2016-1631

Published on: 03/05/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Chrome from Google contain the following vulnerability:

The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

  • CVE-2016-1631 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
[security-announce] openSUSE-SU-2016:0684-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0684
Google Chrome Prior to 49.0.2623.75 Multiple Security Vulnerabilities cve.report (archive)
text/html
URL Logo BID 84008
[security-announce] openSUSE-SU-2016:0664-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0664
Debian -- Security Information -- DSA-3507-1 chromium-browser www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3507
569496 - Security: Universal XSS using Flash message loop - chromium - Monorail code.google.com
text/html
URL Logo CONFIRM code.google.com/p/chromium/issues/detail?id=569496
Issue 1559113002: Fix PPB_Flash_MessageLoop. - Code Review codereview.chromium.org
text/html
URL Logo CONFIRM codereview.chromium.org/1559113002/
USN-2920-1: Oxide vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2920-1
Google Chrome Multiple Bugs Let Remote Users Execute Arbitrary Code, Bypass Security Restrictions, and Obtain Potentially Sensitive Information - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035185
[security-announce] openSUSE-SU-2016:0729-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0729
Chrome Releases: Stable Channel Update Vendor Advisory
googlechromereleases.blogspot.com
text/html
URL Logo CONFIRM googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
Chromium: Multiple vulnerabilities (GLSA 201603-09) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201603-09
[security-announce] SUSE-SU-2016:0665-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:0665

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationGoogleChromeAllAllAllAll
  • cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*: