First published: Sun Sep 11 2016(Updated: )
The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks via a crafted web page that is accessed with the "Save page as" menu choice.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <=52.0.2743.116 | |
openSUSE | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5166 is considered a moderate severity vulnerability.
To fix CVE-2016-5166, ensure you update Google Chrome to version 53.0.2785.89 or later.
CVE-2016-5166 affects Google Chrome versions before 53.0.2785.89.
Yes, openSUSE Leap 42.1 is also affected by CVE-2016-5166.
CVE-2016-5166 is classified as a file handling vulnerability.