Site icon WinCert

A zero-day vulnerability discovered in Chrome browser

<p>Google has just released an update for the Windows version of its Chrome browser&period; The update should fix a zero-day vulnerability that has been discovered and actively exploited all around the world&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone size-full wp-image-613" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2015&sol;01&sol;chrome&period;jpg" alt&equals;"" width&equals;"720" height&equals;"340" &sol;><&sol;p>&NewLine;<p>A high severity bug marked as CVE-2022-Google has patched 2294 in the latest stable Chrome build &lpar;103&period;0&period;5060&period;114&rpar;&period;<&sol;p>&NewLine;<p>Luckily&comma; Google Chrome is updating automatically when the browser is restarted so a large number of clients are already patched&period; Still&comma; it may take weeks for the update remainder to pop for the users that don&&num;8217&semi;t close their browser regularly&period;<&sol;p>&NewLine;<p>Google hasn&&num;8217&semi;t provided access to the bug details and links since hackers could use them for leveraging this exploit&period; Once Google will be sure that the majority of clients have been patched&comma; details about the exploit will be published&period;<&sol;p>&NewLine;<p>According to Avast&&num;8217&semi;s Jan Vojtesek&comma; the flaw is a high-severity heap-based buffer overflow weakness that allows attackers to successfully exploit to crash programs and run arbitrary code on affected endpoints&period;<&sol;p>&NewLine;<p>Users and Enterprise Admins are advised to keep their Chrome installations patched regularly in order to avoid possible exploits&period;<&sol;p>&NewLine;

Exit mobile version