CVE-2016-1706

Published on: 07/23/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:04 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Certain versions of Chrome from Google contain the following vulnerability:

The PPAPI implementation in Google Chrome before 52.0.2743.82 does not validate the origin of IPC messages to the plugin broker process that should have come from the browser process, which allows remote attackers to bypass a sandbox protection mechanism via an unexpected message type, related to broker_process_dispatcher.cc, ppapi_plugin_process_host.cc, ppapi_thread.cc, and render_frame_message_filter.cc.

  • CVE-2016-1706 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.6 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED HIGH HIGH HIGH

CVSS2 Score: 9.3 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Google Chrome Multiple Flaws Lets Remote Users Bypass Same-Origin Restrictions, Obtain Potentially Sensitive Information, Spoof URLs, and Execute Arbitrary Code - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1036428
[security-announce] openSUSE-SU-2016:1865-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1865
USN-3041-1: Oxide vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-3041-1
Debian -- Security Information -- DSA-3637-1 chromium-browser www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3637
[security-announce] openSUSE-SU-2016:1869-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1869
Chrome Releases: Stable Channel Update Vendor Advisory
googlechromereleases.blogspot.com
text/html
URL Logo CONFIRM googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
Issue 2069853002: Ignore certain messages in plugin broker process if they are not sent by the - Code Review Issue Tracking
codereview.chromium.org
text/html
URL Logo CONFIRM codereview.chromium.org/2069853002/
610600 - sandbox escape using ppapi broker - chromium - Monorail crbug.com
text/html
URL Logo CONFIRM crbug.com/610600
[security-announce] openSUSE-SU-2016:1918-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1918
[security-announce] openSUSE-SU-2016:1868-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1868
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1485

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationGoogleChromeAllAllAllAll
  • cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*: