CVE-2016-1654
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
18/04/2016
Last modified:
12/04/2025
Description
The media subsystem in Google Chrome before 50.0.2661.75 does not initialize an unspecified data structure, which allows remote attackers to cause a denial of service (invalid read operation) via unknown vectors.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | 49.0.2623.112 (including) | |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2016-0638.html
- http://www.debian.org/security/2016/dsa-3549
- http://www.ubuntu.com/usn/USN-2955-1
- https://crbug.com/589512
- https://security.gentoo.org/glsa/201605-02
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2016-0638.html
- http://www.debian.org/security/2016/dsa-3549
- http://www.ubuntu.com/usn/USN-2955-1
- https://crbug.com/589512
- https://security.gentoo.org/glsa/201605-02