CVE编号
CVE-2016-1661利用情况
暂无补丁情况
官方补丁披露时间
2016-05-15漏洞描述
Google Chrome是一款流行的Web浏览器。Google Chrome cross-process框架存在内存破坏漏洞,允许远程攻击者利用漏洞构建恶意WEB页,诱使用户解析,使应用程序崩溃或执行任意代码。
解决建议
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
参考链接 |
|
---|---|
http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html | |
http://rhn.redhat.com/errata/RHSA-2016-0707.html | |
http://www.debian.org/security/2016/dsa-3564 | |
http://www.securityfocus.com/bid/89106 | |
http://www.ubuntu.com/usn/USN-2960-1 | |
https://codereview.chromium.org/1887553002/ | |
https://crbug.com/601629 | |
https://security.gentoo.org/glsa/201605-02 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | chrome | * |
Up to (including) 50.0.2661.87 |
||||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 50.0.2661.94-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | chromium-browser | * |
Up to (excluding) 48.0.2564.116-1~deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse | opensuse | 13.1 | - | |||||
运行在以下环境 | |||||||||
系统 | opensuse_13.1 | chromium-browser | * |
Up to (excluding) 51.0.2704.103-147.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_13.2 | chromium-browser | * |
Up to (excluding) 50.0.2661.94-97.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.1 | chromium-browser | * |
Up to (excluding) 50.0.2661.94-45.1 |
|||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_desktop_supplementary | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_supplementary | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_supplementary_eus | 6.7z | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_workstation_supplementary | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat_6 | chromium-browser | * |
Up to (excluding) 0:50.0.2661.94-1.el6 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | chromium-browser | * |
Up to (excluding) 50.0.2661.102-0ubuntu0.14.04.1.1117 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | oxide-qt | * |
Up to (excluding) 50.0.2661.102-0ubuntu0.16.04.1.1237 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | chromium-browser | * |
Up to (excluding) 50.0.2661.102-0ubuntu0.16.04.1.1237 |
|||||
- 攻击路径 本地
- 攻击复杂度 困难
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 -
还没有评论,来说两句吧...