First published: Sun Sep 11 2016(Updated: )
The bidirectional-text implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not ensure left-to-right (LTR) rendering of URLs, which allows remote attackers to spoof the address bar via crafted right-to-left (RTL) Unicode text, related to omnibox/SuggestionView.java and omnibox/UrlBar.java in Chrome for Android.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <=52.0.2743.116 | |
SUSE Linux | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-5163 is classified as high due to its potential to allow phishing attacks through address bar spoofing.
To mitigate CVE-2016-5163, users should update Google Chrome to version 53.0.2785.89 or later on Windows and OS X, or 53.0.2785.92 or later on Linux.
CVE-2016-5163 affects Google Chrome versions prior to 53.0.2785.89 on Windows and OS X, and before 53.0.2785.92 on Linux.
CVE-2016-5163 exploits a vulnerability in the bidirectional-text implementation that fails to properly render URLs from right-to-left Unicode text.
Yes, CVE-2016-5163 can be exploited by remote attackers to spoof the address bar, misleading users into believing they are visiting legitimate websites.