CVE-2016-1697

The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

07 Nov 2023, 02:30

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html -
References (CONFIRM) https://crbug.com/613266 - Permissions Required () https://crbug.com/613266 -
References (DEBIAN) http://www.debian.org/security/2016/dsa-3594 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3594 -
References (CONFIRM) https://codereview.chromium.org/2021373003 - Issue Tracking () https://codereview.chromium.org/2021373003 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html -
References (CONFIRM) http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html -
References (UBUNTU) http://www.ubuntu.com/usn/USN-2992-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2992-1 -
References (REDHAT) https://access.redhat.com/errata/RHSA-2016:1201 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1201 -
References (SECTRACK) http://www.securitytracker.com/id/1036026 - Third Party Advisory () http://www.securitytracker.com/id/1036026 -

Information

Published : 2016-06-05 23:59

Updated : 2023-11-07 02:30


NVD link : CVE-2016-1697

Mitre link : CVE-2016-1697


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

redhat

  • enterprise_linux_desktop
  • enterprise_linux_server
  • enterprise_linux_workstation

opensuse

  • leap
  • opensuse

suse

  • linux_enterprise

google

  • chrome
CWE
CWE-284

Improper Access Control