New Zero-Day Chrome Web Browser Vulnerability

Risk:
high
Damage:
high
Platform(s):
Google
Advisory ID:
ngCERT-2022-0067
Version:
N/A
CVE:
CVE-2022-0609
Published:
February 15, 2022

Summary


The Chrome web browser has eight security flaws that have been discovered and reported, including a high-severity flaw that is actively being exploited in real-world attacks. Google, on the other hand, has released fixes for the Chrome web browser's security flaws, marking the internet giant's first zero-day patch in 2022.

Description & Consequence


The Vulnerability tracked as CVE-2022-0609, is described as a Use-After-Free (UAF) vulnerability in the Animation component. Use-After-Free is a memory corruption bug that occurs when an application attempts to use memory that is no longer assigned to it (or has been freed) – after that memory has been assigned to another application. 

If successfully exploited could lead to corruption of valid data and the execution of arbitrary code on affected systems. Furthermore, if malicious data is entered before chunk consolidation can take place, it may be possible to take advantage of a write-what-where primitive to execute arbitrary code. If chunk consolidation occurs after the use of previously freed data, the process may crash when invalid data is used as chunk information.

Solution


To mitigate any potential threats, Google Chrome users are strongly advised to update to the latest version 98.0.4758.102 for Windows, Mac, and Linux. To install the update immediately simply go to the Chrome menu > Help > About Google. Also, the browser will automatically check for new updates and install them the next time you close and relaunch Google Chrome.

Reference


Revision


Related Articles