First published: Sun Feb 24 2019(Updated: )
Incorrect handling of cancelled requests in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
Credit: Juno Im Theori cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | |
openSUSE Backports | =15.0 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-5794 has been classified as a high-severity vulnerability due to its potential for domain spoofing.
To fix CVE-2019-5794, update your Google Chrome or Chromium browser to version 73.0.3683.75 or later.
CVE-2019-5794 affects Google Chrome and Chromium browsers prior to version 73.0.3683.75.
The primary risk associated with CVE-2019-5794 is that it allows remote attackers to spoof the security UI, potentially leading users to unknowingly interact with malicious sites.
Yes, CVE-2019-5794 is exploitable in real-world scenarios, particularly if users are misled by crafted HTML pages designed to mimic legitimate domains.