First published: Sat Apr 21 2018(Updated: )
An url spoof flaw was found in the Omnibox component of the Chromium browser. Upstream bug(s): <a href="https://code.google.com/p/chromium/issues/detail?id=835554">https://code.google.com/p/chromium/issues/detail?id=835554</a> External References: <a href="https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html</a>
Credit: Lnyas Zhang cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <68.0.3440.75 | 68.0.3440.75 |
debian/chromium-browser | ||
Google Chrome | <68.0.3440.75 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Google Chrome | <68.0.3440.75 | 68.0.3440.75 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this URL spoof vulnerability is CVE-2018-6166.
The title of this vulnerability is URL spoof in Omnibox.
The description of this vulnerability is that it allows a remote attacker to perform domain spoofing via IDN homographs.
The affected software includes Google Chrome prior to version 68.0.3440.75, Chromium browser, and Debian and Redhat Linux.
The severity of vulnerability CVE-2018-6166 is medium with a CVSS score of 6.5.