CVE-2016-5198

V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2016-2672.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2672.html Third Party Advisory
http://www.securityfocus.com/bid/94079 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/94079 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037224 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037224 Broken Link Third Party Advisory VDB Entry
https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html Release Notes Vendor Advisory
https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html Release Notes Vendor Advisory
https://crbug.com/659475 Exploit Issue Tracking
https://crbug.com/659475 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

28 Jun 2024, 14:19

Type Values Removed Values Added
First Time Redhat enterprise Linux Desktop
Apple
Apple macos
Linux linux Kernel
Redhat enterprise Linux Workstation
Google android
Linux
Microsoft
Microsoft windows
Redhat enterprise Linux Server
Redhat
CPE cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
References () http://www.securitytracker.com/id/1037224 - () http://www.securitytracker.com/id/1037224 - Broken Link, Third Party Advisory, VDB Entry
References () https://crbug.com/659475 - () https://crbug.com/659475 - Exploit, Issue Tracking
References () https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html - () https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html - Release Notes, Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2672.html - () http://rhn.redhat.com/errata/RHSA-2016-2672.html - Third Party Advisory
References () http://www.securityfocus.com/bid/94079 - () http://www.securityfocus.com/bid/94079 - Broken Link, Third Party Advisory, VDB Entry

07 Nov 2023, 02:33

Type Values Removed Values Added
References (SECTRACK) http://www.securitytracker.com/id/1037224 - () http://www.securitytracker.com/id/1037224 -
References (CONFIRM) https://crbug.com/659475 - () https://crbug.com/659475 -
References (CONFIRM) https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html - () https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2672.html - () http://rhn.redhat.com/errata/RHSA-2016-2672.html -
References (BID) http://www.securityfocus.com/bid/94079 - () http://www.securityfocus.com/bid/94079 -

Information

Published : 2017-01-19 05:59

Updated : 2025-02-20 18:06


NVD link : CVE-2016-5198

Mitre link : CVE-2016-5198


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_workstation

google

  • chrome
  • android

apple

  • macos

linux

  • linux_kernel

microsoft

  • windows
CWE
CWE-787

Out-of-bounds Write

CWE-125

Out-of-bounds Read