{"id":23740,"date":"2024-01-18T04:10:03","date_gmt":"2024-01-18T12:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/01\/18\/news-17470\/"},"modified":"2024-01-18T04:10:03","modified_gmt":"2024-01-18T12:10:03","slug":"news-17470","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/18\/news-17470\/","title":{"rendered":"Update Chrome! Google patches actively exploited zero-day vulnerability"},"content":{"rendered":"\n<p>Google has\u00a0<a href=\"https:\/\/chromereleases.googleblog.com\/2024\/01\/stable-channel-update-for-desktop_16.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">released an update<\/a>\u00a0for Chrome which includes four security fixes, including one for a vulnerability that has reportedly already been exploited.<\/p>\n<p>The easiest way to update Chrome is to allow it to update automatically, which basically uses the same method as outlined below but does not require your attention. But you can end up lagging behind if you never close the browser or if something goes wrong\u2014such as an extension stopping you from updating the browser.<\/p>\n<p>So, it doesn\u2019t hurt to check now and then. And now would be a good time, given the severity of the vulnerability in this patch. My preferred method is to have Chrome open the page&nbsp;<em>chrome:\/\/settings\/help<\/em>&nbsp;which you can also find by clicking&nbsp;<strong>Settings &gt; About Chrome<\/strong>.<\/p>\n<p>If there is an update available, Chrome will notify you and start downloading it. Then all you have to do is relaunch the browser in order for the update to complete, and for you to be safe from those vulnerabilities.<\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"701\" height=\"330\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/Chrome_uotodate.png\" alt=\"screenshot of About Chrome after the update has been applied\" class=\"wp-image-102253\" style=\"width:700px\" \/><\/figure>\n<p class=\"has-text-align-center\">After the update, the version should be 120.0.6099.224, or later<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-technical-details\">Technical details<\/h2>\n<p>Google never gives out a lot of information about vulnerabilities, for obvious reasons. Access to bug details and links may be kept restricted until a majority of users are updated with a fix. However, from the update page we can learn a few things.<\/p>\n<p>Three vulnerabilities found by external researchers all lie in Chrome\u2019s V8 JavaScript engine.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The three V8 vulnerabilities are listed as:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-0517\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-0517<\/a>: an out of bounds write in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.<\/p>\n<p>An out-of-bounds write can occur when a program writes outside the bounds of an allocated area of memory, potentially leading to a crash or arbitrary code execution. This can happen when the size of the data written is larger than the size of the allocated memory area, when the data is written to an incorrect location within the memory area, or when the program incorrectly calculates the size or location of the data to be written.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-0518\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-0518<\/a>: a type confusion in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.<\/p>\n<p>Type confusion vulnerabilities are programming flaws that happen when a piece of code doesn\u2019t verify the type of object that is passed to it before using it. Type confusion can allow an attacker to feed function pointers or data into the wrong piece of code. In this case, it can lead to heap corruption.<\/p>\n<p>Heap corruption occurs when a program modifies the contents of a memory location outside of the memory allocated to the program. The heap is an area of memory made available for use by the program. The program can request blocks of memory for its use within the heap.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-0519\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-0519<\/a>: out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.<\/p>\n<p>An out-of-bounds memory access means that the software has access to data past the end, or before the beginning, of the intended buffer.<\/p>\n<p>Google notes that it is aware of reports that an exploit for CVE-2024-0519 exists in the wild.<\/p>\n<p>V8 is an open-source JavaScript and WebAssembly engine developed by the Chromium Project for Chromium and Google Chrome web browsers, so users of other Chromium based browsers, like Microsoft Edge, can expect to see similar updates in the near future.<\/p>\n<p>Microsoft <a href=\"https:\/\/learn.microsoft.com\/en-us\/deployedge\/microsoft-edge-relnotes-security#january-16-2024\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">says<\/a> it\u2019s actively working on releasing a security patch and added:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cIt&#8217;s worth highlighting that Microsoft Edge&#8217;s enhanced security mode feature mitigates this vulnerability. You can opt-in into this security feature and have peace of mind that Microsoft Edge is protecting you against this exploit.\u201d<\/p>\n<\/blockquote>\n<p>Use the following steps to configure enhanced security in Edge.<\/p>\n<ol start=\"1\">\n<li>In Microsoft Edge, go to&nbsp;<strong>Settings and more<\/strong>&nbsp;&gt;&nbsp;<strong>Settings<\/strong>&nbsp;&gt;&nbsp;<strong>Privacy, search, and services<\/strong>.<\/li>\n<li>Under&nbsp;<strong>Security<\/strong>, verify that&nbsp;<strong>Enhance your security on the web<\/strong>&nbsp;is enabled.<\/li>\n<li>Select the option that&#8217;s best for your browsing.<\/li>\n<\/ol>\n<p>The following toggle settings are available:<\/p>\n<ul>\n<li>Toggle Off (Default):\u202fFeature is turned off<\/li>\n<li>Toggle On \u2013 Balanced (Recommended):\u202fMicrosoft Edge will apply added security protections when users visit unfamiliar sites but bypass those protections for commonly visited sites. This combination provides a practical level of protection against attackers while preserving the user experience for a user&#8217;s usual tasks on the web.<\/li>\n<li>Toggle On \u2013 Strict: Microsoft Edge will apply added security protections for all the sites a user visits. Users may report some challenges accomplishing their usual tasks.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/01\/update-chrome-google-patches-actively-exploited-zero-day-vulnerability\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Google has issued a security update for the Chrome browser that includes a patch for one zero-day vulnerability. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10699,30738,30739,30740,12616,22783,29532,32,28258,26699,19988],"class_list":["post-23740","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-chrome","tag-cve-2024-0517","tag-cve-2024-0518","tag-cve-2024-0519","tag-edge","tag-exploits-and-vulnerabilities","tag-heap-corruption","tag-news","tag-out-of-bounds-write","tag-personal","tag-type-confusion"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23740"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23740\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23740"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}