First published: Tue Jun 06 2017(Updated: )
Inappropriate implementation in CSP reporting in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to obtain the value of url fragments via a crafted HTML page.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Chrome | <59.0.3071.86 | 59.0.3071.86 |
Google Chrome (Trace Event) | <59.0.3071.86 | |
Apple iOS and macOS | ||
Linux Kernel | ||
Microsoft Windows | ||
Google Chrome (Trace Event) | <59.0.3071.92 | |
Android | ||
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5075 is classified as a medium severity vulnerability.
To fix CVE-2017-5075, you should upgrade Google Chrome to version 59.0.3071.86 or later.
Google Chrome versions prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android are affected by CVE-2017-5075.
CVE-2017-5075 is an information leak vulnerability related to CSP reporting in Google Chrome.
Yes, CVE-2017-5075 can be exploited remotely through a crafted HTML page.