CVE-2017-5066

Publication date 27 October 2017

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.

Status

Package Ubuntu Release Status
chromium-browser 18.10 cosmic
Fixed 58.0.3029.81-0ubuntu2.1350
18.04 LTS bionic
Fixed 58.0.3029.81-0ubuntu2.1350
17.10 artful
Fixed 58.0.3029.81-0ubuntu2.1350
17.04 zesty
Fixed 58.0.3029.81-0ubuntu2.17.04.1350
16.10 yakkety
Fixed 58.0.3029.81-0ubuntu0.16.10.1345
16.04 LTS xenial
Fixed 58.0.3029.81-0ubuntu0.16.04.1277
14.04 LTS trusty
Fixed 58.0.3029.81-0ubuntu0.14.04.1172
12.04 LTS precise Ignored
oxide-qt 18.10 cosmic Not in release
18.04 LTS bionic Not in release
17.10 artful Ignored end of life
17.04 zesty Ignored end of life
16.10 yakkety Ignored end of life
16.04 LTS xenial Ignored Ubuntu touch end-of-life
14.04 LTS trusty Not in release
12.04 LTS precise Not in release

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact High
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N