Ubuntu Security Notice (C) 2016-2017 Canonical, Inc. / NASL script (C) 2016-2017 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
Multiple vulnerabilities were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to conduct cross-site scripting (XSS)
attacks, read uninitialized memory, obtain sensitive information,
spoof the webview URL, bypass same origin restrictions, cause a denial
of service via application crash, or execute arbitrary code.
(CVE-2016-5204, CVE-2016-5205, CVE-2016-5207, CVE-2016-5208,
CVE-2016-5209, CVE-2016-5212, CVE-2016-5215, CVE-2016-5222,
CVE-2016-5224, CVE-2016-5225, CVE-2016-5226, CVE-2016-9650,
Multiple vulnerabilities were discovered in V8. If a user were tricked
in to opening a specially crafted website, an attacker could
potentially exploit these to obtain sensitive information, cause a
denial of service via application crash, or execute arbitrary code.
(CVE-2016-5213, CVE-2016-5219, CVE-2016-9651)
An integer overflow was discovered in ANGLE. If a user were tricked in
to opening a specially crafted website, an attacker could potentially
exploit this to cause a denial of service via application crash, or
execute arbitrary code. (CVE-2016-5221).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected liboxideqtcore0 package.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.3
Public Exploit Available : true
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 95661 ()
CVE ID: CVE-2016-5204
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now