{ "id": "CVE-2016-1669", "sourceIdentifier": "cve-coordination@google.com", "published": "2016-05-14T21:59:09.460", "lastModified": "2023-01-19T16:26:40.907", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code." }, { "lang": "es", "value": "La funci\u00f3n Zone::New en zone.cc en Google V8 en versiones anteriores a 5.0.71.47, tal como se utiliza en Google Chrome en versiones anteriores a 50.0.2661.102, no determina correctamente cu\u00e1ndo expandir ciertas asignaciones de memoria, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desbordamiento de buffer) o posiblemente tener otro impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript manipulado." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3 }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "versionEndIncluding": "50.0.2661.87", "matchCriteriaId": "564CADC6-8AB4-4FE0-8E0A-245E87712035" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.0.71", "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "versionStartIncluding": "0.10.0", "versionEndExcluding": "0.10.46", "matchCriteriaId": "91D770B4-E1AB-40F6-A9FC-88E0FE860C81" }, { "vulnerable": true, "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "versionStartIncluding": "0.12.0", "versionEndExcluding": "0.12.15", "matchCriteriaId": "90D7908B-0B23-4CC4-9585-0120DF187A47" }, { "vulnerable": true, "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "versionStartIncluding": "4.0.0", "versionEndIncluding": "4.1.2", "matchCriteriaId": "A47FC4F7-1F77-4314-B4B3-3C5D8E335379" }, { "vulnerable": true, "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "versionStartIncluding": "4.2.0", "versionEndExcluding": "4.4.6", "matchCriteriaId": "9731B34D-C6F6-4129-BFEB-6C5C171F4CC0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "versionStartIncluding": "5.0.0", "versionEndExcluding": "5.12.0", "matchCriteriaId": "30165C60-84D5-49FC-84C9-5CE9CF0DC43D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "versionStartIncluding": "6.0.0", "versionEndIncluding": "6.2.0", "matchCriteriaId": "9ED36E22-DA95-4913-AB4E-4FB696031FFA" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6" } ] } ] } ], "references": [ { "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html", "source": "cve-coordination@google.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html", "source": "cve-coordination@google.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html", "source": "cve-coordination@google.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html", "source": "cve-coordination@google.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.debian.org/security/2016/dsa-3590", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/bid/90584", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id/1035872", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.ubuntu.com/usn/USN-2960-1", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:0879", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:0880", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:0881", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:0882", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:0336", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://codereview.chromium.org/1945313002", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://crbug.com/606115", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/", "source": "cve-coordination@google.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/", "source": "cve-coordination@google.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "https://security.gentoo.org/glsa/201605-02", "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ] } ] }