Vulnerability Description
The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to temporarily spoof the contents of the Omnibox (URL bar) via a crafted HTML page containing PDF data.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | <= 54.0.2840.99 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2016-2919.html
- http://www.securityfocus.com/bid/94633
- https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.
- https://crbug.com/660498
- https://security.gentoo.org/glsa/201612-11
- http://rhn.redhat.com/errata/RHSA-2016-2919.html
- http://www.securityfocus.com/bid/94633
- https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.
- https://crbug.com/660498
- https://security.gentoo.org/glsa/201612-11
FAQ
What is CVE-2016-5218?
CVE-2016-5218 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to tempor...
How severe is CVE-2016-5218?
CVE-2016-5218 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5218?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome.