CVE-2016-5166

The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks via a crafted web page that is accessed with the "Save page as" menu choice.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.1 LOW
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
ChromeCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 70%
VendorProductVersion
googlechrome
𝑥
≤ 52.0.2743.116
opensuseleap
42.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
chromium-browser
yakkety
Fixed 53.0.2785.143-0ubuntu1.1307
released
xenial
Fixed 53.0.2785.143-0ubuntu0.16.04.1.1254
released
trusty
Fixed 53.0.2785.143-0ubuntu0.14.04.1.1142
released
precise
ignored
oxide-qt
yakkety
not-affected
xenial
not-affected
trusty
dne
precise
dne