First published: Tue Jun 06 2017(Updated: )
Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Chrome | <59.0.3071.86 | 59.0.3071.86 |
Google Chrome (Trace Event) | <59.0.3071.86 | |
Apple iOS and macOS | ||
Linux Kernel | ||
Microsoft Windows | ||
Google Chrome (Trace Event) | <59.0.3071.92 | |
Android | ||
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5076 has a high severity rating due to its potential for domain spoofing.
To fix CVE-2017-5076, update Google Chrome to version 59.0.3071.86 or later.
CVE-2017-5076 affects users of Google Chrome versions prior to 59.0.3071.86 on Mac, Windows, and Linux.
CVE-2017-5076 allows remote attackers to perform domain spoofing through IDN homographs.
CVE-2017-5076 is relevant for Android users running Chrome versions prior to 59.0.3071.92.