CVE-2016-1693

Severity
5.3MEDIUM
EPSS
0.9%
top 24.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 5
Latest updateMay 14

Description

browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use the HTTPS service on dl.google.com to obtain the Software Removal Tool, which allows remote attackers to spoof the chrome_cleanup_tool.exe (aka CCT) file via a man-in-the-middle attack on an HTTP session.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 1.6 | Impact: 3.6

Affected Packages7 packages

NVDgoogle/chrome50.0.2661.102
Ubuntuchromium-browser< 51.0.2704.79-0ubuntu0.14.04.1.1121+1
NVDopensuse/leap42.1

Also affects: Debian Linux 8.0, Linux Enterprise 12.0

🔴Vulnerability Details

4
GHSA
GHSA-9h82-p393-44cg: browser/safe_browsing/srt_field_trial_win2022-05-14
OSV
erlang vulnerabilities2018-02-14
OSV
CVE-2016-1693: browser/safe_browsing/srt_field_trial_win2016-06-05
CVEList
CVE-2016-1693: browser/safe_browsing/srt_field_trial_win2016-06-05

📋Vendor Advisories

1
Red Hat
chromium-browser: http download of software removal tool2016-05-25

💬Community

2
Bugzilla
CVE-2016-1693 chromium-browser: http download of software removal tool2016-05-26
Bugzilla
CVE-2016-2116 jasper: memory leak in jas_iccprof_createfrombuf()2016-03-03
CVE-2016-1693 (MEDIUM CVSS 5.3) | browser/safe_browsing/srt_field_tri | cvebase.io