Saturday, December 9, 2023

Actively Exploited Chrome Zero-day Patched: Update Now!

Google has recently deployed updates to mitigate a newly discovered zero-day vulnerability in their Chrome browser, which is currently being actively exploited.

Google has acknowledged its awareness of an exploit currently available for CVE-2023-5217, which has been observed to be actively exploited in real-world scenarios.

The latest version of Google Chrome, namely 117.0.5938.132, has been released for the Windows, Mac, and Linux operating systems. This update primarily focuses on addressing a security vulnerability. The forthcoming update will be released in the upcoming days and weeks.

This update encompasses a total of ten security fixes. Three security issues were assigned a ‘High severity’ rating.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

Details of the Vulnerabilities Addressed

The identified vulnerability, designated as CVE-2023-5217, pertains to a Heap buffer overflow within the vp8 encoding functionality of the libvpx library. This flaw has been classified as high severity. The report was authored by Clément Lecigne, a member of Google’s Threat Analysis Group, and was published on September 25, 2023.

Such buffer overflow flaws can be exploited to cause software crashes or the execution of arbitrary code, affecting the program’s availability and integrity.

A high-severity flaw, identified as CVE-2023-5186, has been discovered. This flaw, known as “Use after free in Passwords,” poses a significant risk. In a report by [pwn2car], it has been revealed.

A High-severity vulnerability tracked as CVE-2023-5187, Use after free in Extensions. Reported by Thomas Orlita and compensated with a $2000 reward.

Update Now!

To reduce potential risks, users are advised to update to Chrome version 117.0.5938.132 for Windows, macOS, and Linux. 

As soon as the fixes become available, users of Chromium-based browsers like Microsoft Edge, Brave, Opera, and Vivaldi are encouraged to install them.

How to Update Google Chrome

  • On your computer, open Chrome.
  • At the top right, click More.
  • Click Help about Google Chrome.
  • Click Update Google Chrome. Important: If you can’t find this button, you’re on the latest version.
  • Click Relaunch.

Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the free trial to ensure 100% security.

Website

Latest articles

WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack

A critical remote code execution vulnerability has been patched as part of the Wordpress...

Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts

Hackers target email accounts because they contain valuable personal and financial information. Successful email...

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid...

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative...

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

Endpoint Strategies for 2024 and beyond

Converge and Defend

What's the pulse of Unified Endpoint Management and Security (UEMS) in Europe? Join us live to uncover the strategies that are defining endpoint security in the region.

Related Articles