CVE-2016-1666
📋 TL;DR
CVE-2016-1666 is a critical vulnerability in Google Chrome that allows attackers to cause denial of service or potentially execute arbitrary code through unknown vectors. This affects all users running Chrome versions before 50.0.2661.94. The high CVSS score indicates this vulnerability could be exploited remotely without authentication.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Enterprise Linux Desktop Supplementary by Redhat
View all CVEs affecting Enterprise Linux Desktop Supplementary →
Enterprise Linux Server Supplementary by Redhat
View all CVEs affecting Enterprise Linux Server Supplementary →
Enterprise Linux Server Supplementary Eus by Redhat
View all CVEs affecting Enterprise Linux Server Supplementary Eus →
Enterprise Linux Workstation Supplementary by Redhat
View all CVEs affecting Enterprise Linux Workstation Supplementary →
Opensuse by Opensuse
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution allowing complete system compromise, data theft, or ransomware deployment.
Likely Case
Browser crash/denial of service, potentially leading to memory corruption that could be leveraged for further exploitation.
If Mitigated
Minimal impact if Chrome is updated to patched version, with browser sandboxing providing some protection against full system compromise.
🎯 Exploit Status
The 'unknown vectors' description suggests this may have been discovered through fuzzing or internal testing rather than active exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 50.0.2661.94 and later
Vendor Advisory: http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
Restart Required: Yes
Instructions:
1. Open Chrome. 2. Click menu (three dots) → Help → About Google Chrome. 3. Chrome will automatically check for updates and install if available. 4. Click 'Relaunch' to restart Chrome with the update.
🔧 Temporary Workarounds
Disable JavaScript
allTemporarily disable JavaScript to reduce attack surface, though this breaks most websites.
chrome://settings/content/javascript → Block
Use Chrome Sandbox
allEnsure Chrome sandbox is enabled for additional protection layers.
chrome://flags → Search 'sandbox' → Ensure enabled
🧯 If You Can't Patch
- Switch to alternative browser until Chrome can be updated
- Implement network filtering to block known malicious websites and restrict browser usage to trusted sites only
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in menu → Help → About Google Chrome. If version is below 50.0.2661.94, system is vulnerable.
Check Version:
On Windows: "C:\Program Files\Google\Chrome\Application\chrome.exe" --version
On macOS: /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version
On Linux: google-chrome --version
Verify Fix Applied:
Confirm Chrome version is 50.0.2661.94 or higher in About Google Chrome page.
📡 Detection & Monitoring
Log Indicators:
- Chrome crash reports with suspicious memory addresses
- Multiple Chrome process terminations in short timeframe
Network Indicators:
- Unusual outbound connections from Chrome processes
- Traffic to known exploit hosting domains
SIEM Query:
source="chrome_logs" AND (event="crash" OR event="process_termination") | stats count by host, user
🔗 References
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://rhn.redhat.com/errata/RHSA-2016-0707.html
- http://www.debian.org/security/2016/dsa-3564
- http://www.securityfocus.com/bid/89106
- http://www.ubuntu.com/usn/USN-2960-1
- https://bugs.chromium.org/p/chromium/issues/detail?id=601001
- https://bugs.chromium.org/p/chromium/issues/detail?id=605491
- https://crbug.com/607652
- https://security.gentoo.org/glsa/201605-02
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://rhn.redhat.com/errata/RHSA-2016-0707.html
- http://www.debian.org/security/2016/dsa-3564
- http://www.securityfocus.com/bid/89106
- http://www.ubuntu.com/usn/USN-2960-1
- https://bugs.chromium.org/p/chromium/issues/detail?id=601001
- https://bugs.chromium.org/p/chromium/issues/detail?id=605491
- https://crbug.com/607652
- https://security.gentoo.org/glsa/201605-02