HIGH · 8.8

CVE-2016-1653

The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified...

Vulnerability Description

The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc.

CVSS Score

8.8

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
DebianDebian Linux8.0
OpensuseLeap42.1
SuseLinux Enterprise12.0
CanonicalUbuntu Linux14.04
GoogleChrome<= 49.0.2623.112

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-1653?

CVE-2016-1653 is a vulnerability with a CVSS score of 8.8 (HIGH). The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified...

How severe is CVE-2016-1653?

CVE-2016-1653 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-1653?

Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Opensuse Leap, Suse Linux Enterprise, Canonical Ubuntu Linux, Google Chrome.