{"id":"UBUNTU-CVE-2016-5173","details":"The extensions subsystem in Google Chrome before 53.0.2785.113 does not properly restrict access to Object.prototype, which allows remote attackers to load unintended resources, and consequently trigger unintended JavaScript function calls and bypass the Same Origin Policy via an indirect interception attack.","modified":"2025-09-08T16:43:46Z","published":"2016-09-25T20:59:00Z","upstream":["CVE-2016-5173"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5173"},{"type":"REPORT","url":"https://googlechromereleases.blogspot.com/2016/09/stable-channel-update-for-desktop_13.html"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-5173"}],"affected":[{"package":{"name":"chromium-browser","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/chromium-browser@53.0.2785.143-0ubuntu0.14.04.1.1142?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"53.0.2785.143-0ubuntu0.14.04.1.1142"}]}],"versions":["29.0.1547.65-0ubuntu2","31.0.1650.63-0ubuntu1~20131204.1","32.0.1700.107-0ubuntu1~20140204.977.1","33.0.1750.152-0ubuntu1~pkg995.1","34.0.1847.116-0ubuntu2","36.0.1985.125-0ubuntu1.14.04.0~pkg1029","37.0.2062.94-0ubuntu0.14.04.1~pkg1042","37.0.2062.120-0ubuntu0.14.04.1~pkg1049","38.0.2125.111-0ubuntu0.14.04.1.1061","39.0.2171.65-0ubuntu0.14.04.1.1064","40.0.2214.94-0ubuntu0.14.04.1.1068","40.0.2214.111-0ubuntu0.14.04.1.1069","41.0.2272.76-0ubuntu0.14.04.1.1076","43.0.2357.81-0ubuntu0.14.04.1.1089","43.0.2357.130-0ubuntu0.14.04.1.1092","44.0.2403.89-0ubuntu0.14.04.1.1095","45.0.2454.85-0ubuntu0.14.04.1.1097","45.0.2454.101-0ubuntu0.14.04.1.1099","47.0.2526.73-0ubuntu0.14.04.1.1106","47.0.2526.106-0ubuntu0.14.04.1.1107","48.0.2564.82-0ubuntu0.14.04.1.1108","48.0.2564.116-0ubuntu0.14.04.1.1111","49.0.2623.87-0ubuntu0.14.04.1.1112","49.0.2623.108-0ubuntu0.14.04.1.1113","50.0.2661.102-0ubuntu0.14.04.1.1117","51.0.2704.79-0ubuntu0.14.04.1.1121","52.0.2743.116-0ubuntu0.14.04.1.1134"],"ecosystem_specific":{"binaries":[{"binary_name":"chromium-browser","binary_version":"53.0.2785.143-0ubuntu0.14.04.1.1142"},{"binary_name":"chromium-browser-l10n","binary_version":"53.0.2785.143-0ubuntu0.14.04.1.1142"},{"binary_name":"chromium-chromedriver","binary_version":"53.0.2785.143-0ubuntu0.14.04.1.1142"},{"binary_name":"chromium-codecs-ffmpeg","binary_version":"53.0.2785.143-0ubuntu0.14.04.1.1142"},{"binary_name":"chromium-codecs-ffmpeg-extra","binary_version":"53.0.2785.143-0ubuntu0.14.04.1.1142"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-5173.json"}},{"package":{"name":"chromium-browser","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/chromium-browser@53.0.2785.143-0ubuntu0.16.04.1.1254?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"53.0.2785.143-0ubuntu0.16.04.1.1254"}]}],"versions":["45.0.2454.101-0ubuntu1.1201","47.0.2526.73-0ubuntu1.1218","47.0.2526.106-0ubuntu1.1221","48.0.2564.82-0ubuntu1.1222","48.0.2564.116-0ubuntu1.1229","49.0.2623.87-0ubuntu1.1232","49.0.2623.108-0ubuntu1.1233","50.0.2661.102-0ubuntu0.16.04.1.1237","51.0.2704.79-0ubuntu0.16.04.1.1242","52.0.2743.116-0ubuntu0.16.04.1.1250"],"ecosystem_specific":{"binaries":[{"binary_name":"chromium-browser","binary_version":"53.0.2785.143-0ubuntu0.16.04.1.1254"},{"binary_name":"chromium-browser-l10n","binary_version":"53.0.2785.143-0ubuntu0.16.04.1.1254"},{"binary_name":"chromium-chromedriver","binary_version":"53.0.2785.143-0ubuntu0.16.04.1.1254"},{"binary_name":"chromium-codecs-ffmpeg","binary_version":"53.0.2785.143-0ubuntu0.16.04.1.1254"},{"binary_name":"chromium-codecs-ffmpeg-extra","binary_version":"53.0.2785.143-0ubuntu0.16.04.1.1254"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-5173.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}]}