6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.805 High
EPSS
Percentile
98.3%
Severity: Critical
Date : 2020-11-03
CVE-ID : CVE-2020-16004 CVE-2020-16005 CVE-2020-16006 CVE-2020-16007
CVE-2020-16008 CVE-2020-16009
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1261
The package chromium before version 86.0.4240.183-1 is vulnerable to
multiple issues including arbitrary code execution and privilege
escalation.
Upgrade to 86.0.4240.183-1.
The problems have been fixed upstream in version 86.0.4240.183.
None.
A use after free security issue has been found in the user interface
component of the chromium browser before 86.0.4240.75.
An insufficient policy enforcement security issue has been found in the
ANGLE component of the chromium browser before 86.0.4240.75, allowing a
remote attacker to potentially exploit heap corruption via a crafted
HTML page.
An inappropriate implementation security issue has been found in the V8
component of the chromium browser before 86.0.4240.75, allowing a
remote attacker to potentially exploit heap corruption via a crafted
HTML page.
An insufficient data validation security issue has been found in the
installer component of the chromium browser before 86.0.4240.75,
allowing a local attacker to potentially elevate privilege via a
crafted filesystem.
A stack-based buffer overflow security issue has been found in the
WebRTC component of the chromium browser before 86.0.4240.75
An inappropriate implementation security issue has been found in the V8
component of the chromium browser before 86.0.4240.75. Google is aware
of reports that an exploit for this issue exists in the wild.
A remote attacker can bypass security measures and execute arbitrary
code.
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
https://crbug.com/1138911
https://crbug.com/1139398
https://crbug.com/1133527
https://crbug.com/1125018
https://crbug.com/1134107
https://crbug.com/1143772
https://security.archlinux.org/CVE-2020-16004
https://security.archlinux.org/CVE-2020-16005
https://security.archlinux.org/CVE-2020-16006
https://security.archlinux.org/CVE-2020-16007
https://security.archlinux.org/CVE-2020-16008
https://security.archlinux.org/CVE-2020-16009
chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
crbug.com/1125018
crbug.com/1133527
crbug.com/1134107
crbug.com/1138911
crbug.com/1139398
crbug.com/1143772
security.archlinux.org/AVG-1261
security.archlinux.org/CVE-2020-16004
security.archlinux.org/CVE-2020-16005
security.archlinux.org/CVE-2020-16006
security.archlinux.org/CVE-2020-16007
security.archlinux.org/CVE-2020-16008
security.archlinux.org/CVE-2020-16009
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.805 High
EPSS
Percentile
98.3%