CVE-2016-5193 – chromium-browser: scheme bypass
https://notcve.org/view.php?id=CVE-2016-5193
Google Chrome prior to 54.0 for iOS had insufficient validation of URLs for windows open by DOM, which allowed a remote attacker to bypass restrictions on navigation to certain URL schemes via crafted HTML pages. Google Chrome en versiones previas a 54.0 para iOS tiene una validación insuficiente de URLs para windows en ventanas abiertas por DOM, lo que permite a un atacante remoto eludir restricciones de navegación a ciertos esquemas de URL a través de páginas HTML manipuladas. • http://rhn.redhat.com/errata/RHSA-2016-2067.html http://www.securityfocus.com/bid/93528 https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html https://crbug.com/639658 https://security.gentoo.org/glsa/201610-09 https://access.redhat.com/security/cve/CVE-2016-5193 https://bugzilla.redhat.com/show_bug.cgi?id=1384364 • CWE-20: Improper Input Validation •
CVE-2016-5186 – chromium-browser: out of bounds read in devtools
https://notcve.org/view.php?id=CVE-2016-5186
Devtools in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled objects after a tab crash, which allowed a remote attacker to perform an out of bounds memory read via crafted PDF files. Devtools en Google Chrome en versiones previas a 54.0.2840.59 para Windows, Mac y Linux; 54.0.2840.85 para Android maneja incorrectamente objetos después de una caída de pestaña, lo que permite a un atacante remoto llevar a cabo una lectura de memoria fuera de límites a través de archivos PDF manipulados. • http://rhn.redhat.com/errata/RHSA-2016-2067.html http://www.securityfocus.com/bid/93528 https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html https://crbug.com/644963 https://security.gentoo.org/glsa/201610-09 https://access.redhat.com/security/cve/CVE-2016-5186 https://bugzilla.redhat.com/show_bug.cgi?id=1384360 • CWE-125: Out-of-bounds Read •
CVE-2016-5183 – chromium-browser: use after free in pdfium
https://notcve.org/view.php?id=CVE-2016-5183
A heap use after free in PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android allows a remote attacker to potentially exploit heap corruption via crafted PDF files. Un uso después de liberación de memoria en PDFium en Google Chrome en versiones previas a 54.0.2840.59 para Windows, Mac y Linux; 54.0.2840.85 para Android permite a un atacante remoto explotar potencialmente una corrupción de memoria a través de archivos PDF manipulados. • http://rhn.redhat.com/errata/RHSA-2016-2067.html http://www.securityfocus.com/bid/93528 https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html https://codereview.chromium.org/2338893002 https://crbug.com/645122 https://security.gentoo.org/glsa/201610-09 https://access.redhat.com/security/cve/CVE-2016-5183 https://bugzilla.redhat.com/show_bug.cgi?id=1384349 • CWE-416: Use After Free •
CVE-2016-5189 – chromium-browser: url spoofing
https://notcve.org/view.php?id=CVE-2016-5189
Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted navigation to blob URLs with non-canonical origins, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages. Google Chrome en versiones previas a 54.0.2840.59 para Windows, Mac y Linux; 54.0.2840.85 para Android permite la navegación para borrar URLs con orígenes irregulares, lo que permite a un atacante remoto suplantar contenidos de la Omnibox (barra de URL) a través de páginas HTML manipuladas. • http://rhn.redhat.com/errata/RHSA-2016-2067.html http://www.securityfocus.com/bid/93528 https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html https://crbug.com/646278 https://security.gentoo.org/glsa/201610-09 https://access.redhat.com/security/cve/CVE-2016-5189 https://bugzilla.redhat.com/show_bug.cgi?id=1384358 • CWE-284: Improper Access Control •
CVE-2016-5184 – chromium-browser: use after free in pdfium
https://notcve.org/view.php?id=CVE-2016-5184
PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles in CFFL_FormFillter::KillFocusForAnnot, which allowed a remote attacker to potentially exploit heap corruption via crafted PDF files. PDFium en Google Chrome en versiones previas a 54.0.2840.59 para Windows, Mac y Linux; 54.0.2840.85 para Android maneja incorrectamente los ciclos de vida de objetos en CFFL_FormFillter::KillFocusForAnnot, lo que permite a un atacante remoto explotar potencialmente una corrupción de memoria a través de archivos PDF manipulados. • http://rhn.redhat.com/errata/RHSA-2016-2067.html http://www.securityfocus.com/bid/93528 https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.html https://crbug.com/630654 https://security.gentoo.org/glsa/201610-09 https://access.redhat.com/security/cve/CVE-2016-5184 https://bugzilla.redhat.com/show_bug.cgi?id=1384350 • CWE-416: Use After Free •