CVE-2016-5166

The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks via a crafted web page that is accessed with the "Save page as" menu choice.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-09-11 10:59

Updated : 2024-02-04 18:53


NVD link : CVE-2016-5166

Mitre link : CVE-2016-5166

CVE.ORG link : CVE-2016-5166


JSON object : View

Products Affected

opensuse

  • leap

google

  • chrome
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor