CVE-2016-1660

Published on: 05/14/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:04 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Chrome from Google contain the following vulnerability:

Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray and WTF::double_conversion::Vector classes, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted web site.

  • CVE-2016-1660 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Chrome Releases: Stable Channel Update Vendor Advisory
googlechromereleases.blogspot.com
text/html
URL Logo CONFIRM googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0707
Issue 1677363002: Change assert to release assert for WTF::double_conversion::Vector to prevent OOB memory access. - Code Review codereview.chromium.org
text/html
URL Logo CONFIRM codereview.chromium.org/1677363002
574802 - chromium - An open-source project to help move the web forward. - Monorail crbug.com
text/html
URL Logo CONFIRM crbug.com/574802
USN-2960-1: Oxide vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2960-1
[security-announce] openSUSE-SU-2016:1208-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1208
[security-announce] openSUSE-SU-2016:1209-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1209
Issue 1672603002: Change assert to release assert for BitArray to prevent out-of-bounds access. - Code Review codereview.chromium.org
text/html
URL Logo CONFIRM codereview.chromium.org/1672603002
[security-announce] openSUSE-SU-2016:1207-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1207
Chromium: Multiple vulnerabilities (GLSA 201605-02) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201605-02
Google Chrome Prior to 50.0.2661.94 Multiple Security Vulnerabilities cve.report (archive)
text/html
URL Logo BID 89106
[security-announce] openSUSE-SU-2016:1655-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1655
Debian -- Security Information -- DSA-3564-1 chromium-browser www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3564

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationGoogleChromeAllAllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
Operating
System
RedhatEnterprise Linux Desktop Supplementary6.0AllAllAll
Operating
System
RedhatEnterprise Linux Desktop Supplementary6.0AllAllAll
Operating
System
RedhatEnterprise Linux Server Supplementary6.0AllAllAll
Operating
System
RedhatEnterprise Linux Server Supplementary6.0AllAllAll
Operating
System
RedhatEnterprise Linux Server Supplementary Eus6.7zAllAllAll
Operating
System
RedhatEnterprise Linux Server Supplementary Eus6.7zAllAllAll
Operating
System
RedhatEnterprise Linux Workstation Supplementary6.0AllAllAll
Operating
System
RedhatEnterprise Linux Workstation Supplementary6.0AllAllAll
  • cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*: