{"id":22898,"date":"2023-09-12T16:11:31","date_gmt":"2023-09-13T00:11:31","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/09\/12\/news-16628\/"},"modified":"2023-09-12T16:11:31","modified_gmt":"2023-09-13T00:11:31","slug":"news-16628","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/09\/12\/news-16628\/","title":{"rendered":"Update Chrome now! Google patches critical vulnerability being exploited in the wild"},"content":{"rendered":"<p>Google has <a href=\"https:\/\/chromereleases.googleblog.com\/2023\/09\/stable-channel-update-for-desktop_11.html\" target=\"_blank\" rel=\"nofollow\">released<\/a> an update for Chrome Desktop which includes one critical security fix. There is an active exploit for the patched vulnerability, according to Google, which means cybercriminals are aware of the vulnerability and are using it.<\/p>\n<p>If you&rsquo;re a Chrome user on Windows, Mac, or Linux, you should update as soon as possible.<\/p>\n<p>The easiest way to update Chrome is to allow it to update automatically, which basically uses the same method as outlined below but does not require your attention. But you can end up lagging behind if you never close the browser or if something goes wrong&mdash;such as an extension stopping you from updating the browser.<\/p>\n<p>So, it doesn&rsquo;t hurt to check now and then. And now would be a good time, given the severity of the vulnerabilities in this batch. My preferred method is to have Chrome open the page <em>chrome:\/\/settings\/help<\/em> which you can also find by clicking <strong>Settings &gt; About Chrome<\/strong>.<\/p>\n<p>If there is an update available, Chrome will notify you and start downloading it. Then all you have to do is relaunch the browser in order for the update to complete.<\/p>\n<p style=\"margin: 0cm 0cm 8pt; line-height: 107%; font-size: 11pt; font-family: Calibri, sans-serif;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/easset_upload_file39022_280759_e.png\" alt=\"up to date Chrome \" width=\"724\" height=\"308\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>After the update, the version should be 116.0.5845.187 for Mac and Linux, and 116.0.5845.187\/.188 for Windows, or later.<\/p>\n<h2>The vulnerability<\/h2>\n<p>Google never gives out a lot of information about vulnerabilities, for obvious reasons. Access to bug details and links may be kept restricted until a majority of users are updated with a fix. However, from the update page we can learn a few things.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The zero-day patched in this update is listed as:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-4863\" target=\"_blank\" rel=\"nofollow\">CVE-2023-4863<\/a>: a heap buffer overflow in WebP, also described as a vulnerability that resides in the WebP image format which could lead to arbitrary code execution or a crash.<\/p>\n<p>A buffer overflow is a type of software vulnerability that exists when an area of memory within a software application reaches its address boundary and writes into an adjacent memory region. In software exploit code, two common areas that are targeted for overflows are the stack and the heap.<\/p>\n<p>The heap is an area of memory made available use by the program. The program can request blocks of memory for its use within the heap. In order to allocate a block of some size, the program makes an explicit request by calling the heap allocation operation.<\/p>\n<p>Credit for reporting the vulnerability was given to Apple Security Engineering and Architecture (SEAR) and The Citizen Lab at The University of Toronto\u02bcs Munk School on 2023-09-06. The fact that this happens to coincide with a <a href=\"https:\/\/citizenlab.ca\/2023\/09\/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild\/\" target=\"_blank\" rel=\"nofollow\">report by CitizenLab<\/a> about two Apple vulnerabilities that used by the NSO group to drop the Pegasus spyware, seems too much to be a coincidence.<\/p>\n<p>Add the fact that both <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/two-known-apple-issues-added-by-cisa-to-the-catalog-of-known-exploited-vulnerabilities\">Apple CVE-2023-41064<\/a> and &nbsp;Chrome CVE-2023-4863 are based on image processing and we feel comfortable saying that these two vulnerabilities are very, very likely to be related.<\/p>\n<hr \/>\n<p><strong>We don&rsquo;t just report on threats&mdash;we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/update-chrome-now-google-patches-critical-vulnerability-which-is-exploited-in-the-wild\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/exploits-and-vulnerabilities\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: Google<\/p>\n<p>Tags:  Chrome<\/p>\n<p>Tags:  CVE-2023-4863<\/p>\n<p>Tags:  WebP<\/p>\n<p>Tags:  buffer overflow<\/p>\n<p>Tags:  116.0.5845.187\/.188 <\/p>\n<p>Chrome users are being urged to patch a critical vulnerability for which an exploit is available.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/update-chrome-now-google-patches-critical-vulnerability-which-is-exploited-in-the-wild\" title=\"Update Chrome now! Google patches critical vulnerability being exploited in the wild \">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/update-chrome-now-google-patches-critical-vulnerability-which-is-exploited-in-the-wild\">Update Chrome now! Google patches critical vulnerability being exploited in the wild <\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30118,12033,10699,30116,22783,1670,32,30117],"class_list":["post-22898","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-116-0-5845-187-188","tag-buffer-overflow","tag-chrome","tag-cve-2023-4863","tag-exploits-and-vulnerabilities","tag-google","tag-news","tag-webp"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22898"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22898\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22898"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}