CVE-2016-5172

The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

07 Nov 2023, 02:33

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/201610-09 - Third Party Advisory () https://security.gentoo.org/glsa/201610-09 -
References (CONFIRM) https://crbug.com/616386 - Permissions Required () https://crbug.com/616386 -
References (DEBIAN) http://www.debian.org/security/2016/dsa-3667 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3667 -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-1905.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-1905.html -
References (CONFIRM) https://codereview.chromium.org/2077283004 - Issue Tracking, Patch () https://codereview.chromium.org/2077283004 -
References (BID) http://www.securityfocus.com/bid/92942 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92942 -
References (SECTRACK) http://www.securitytracker.com/id/1036826 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1036826 -
References (CONFIRM) https://googlechromereleases.blogspot.com/2016/09/stable-channel-update-for-desktop_13.html - Vendor Advisory () https://googlechromereleases.blogspot.com/2016/09/stable-channel-update-for-desktop_13.html -

Information

Published : 2016-09-25 20:59

Updated : 2023-11-07 02:33


NVD link : CVE-2016-5172

Mitre link : CVE-2016-5172


JSON object : View

Products Affected

debian

  • debian_linux

google

  • chrome

nodejs

  • node.js
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor