Hexbyte – Science and Tech Google Chrome Update Patches Zero-Day Actively Exploited in the Wild – BleepingComputer

Hexbyte – Science and Tech Google Chrome Update Patches Zero-Day Actively Exploited in the Wild – BleepingComputer

Hexbyte – Science and Tech

Hexbyte - Science and Tech Google Chrome Update Patches Zero-Day Actively Exploited in the Wild

Google updated the release announcement for the Chrome web browser version 72.0.3626.121 with a warning that the 0day patched in the release is being actively exploited in the wild.

After initially publishing the 72.0.3626.121 update on March 1 with no mentions of the security flaw being abused, the Chrome team modified the announcement with exploitation information for the vulnerability stating that “Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild.”

The security issue tracked as CVE-2019-5786 and rated by the Google Chrome team as high severity is a use-after-free flaw in the browser’s FileReader API, an API designed to allow the browser to access and read locally stored files.

Potential attackers can employ maliciously crafted web pages designed to allow them to use previously-freed memory on a visitor’s computer via the Chrome FileReader API to execute arbitrary code and take over the device or trigger a denial of service condition.

Hexbyte - Science and Tech Google Chrome 72.0.3626.121

While possible exploitation of a vulnerable Chrome installation can lead to very serious consequences from data deletion and malware infections, it’s also important to understand that the attackers will only be able to run code under the context of the user browser.

Seeing this, users logged on under accounts with limited rights could be less affected because attackers would have fewer and more limited tools at their disposal to abuse the machine they successfully compromised.

Either way, the word of the day is “update”. Update your Google Chrome web browser to the latest 72.0.3626.121 version since all previous versions are vulnerable to attacks exploiting the CVE-2019-5786 vulnerability.

Hexbyte – Science and Tech Damage control and prevention

Luckily, Google Chrome should be configured by default to auto-update to the latest stable release, so most users should only need to restart their web browsers to be protected.

To limit the damage zero-day vulnerabilities such as the just patched Chrome FileReader use-after-free could lead to if successfully exploited, users should always keep their apps up to date, run software or log on using a limited account, and think twice before visiting websites they don’t trust or click on links from unknown sources.

Read More