2 Chrome Zero-Days Exploited At Pwn2Own 2024 : Patch Now

by Esmeralda McKenzie
2 Chrome Zero-Days Exploited At Pwn2Own 2024 : Patch Now

2 Chrome Zero-Days Exploited At Pwn2Own 2024 : Patch Now

2 Chrome Zero-Days Exploited

Google patched seven vulnerabilities in the Chrome browser on Tuesday, including two zero-day exploits that had been exploited at the Pwn2Own Vancouver 2024 hacking contest.

Researchers at Pwn2Own field exploited the zero-days tagged as Form Confusion in WebAssembly (CVE-2024-2887) and Utilize after free in WebCodecs (CVE-2024-2886).

EHA

Google has mounted the vulnerabilities in the Google Chrome Stable channel to 123.0.6312.86/.87 for Home windows and Mac, and 123.0.6312.86 for Linux.

The update will almost certainly be rolled out in the upcoming days and weeks.

Particulars Of The Zero-Days Flaws Addressed

The competition’s winner, researcher Manfred Paul (@_manfp), exploited a high-severity Form Confusion flaw in WebAssembly identified as CVE-2024-2887 and got a $42,500 award for it on a number of the vital day of Pwn2Own contest.

Represent

Acquire Free CISO’s Manual to Warding off the Subsequent Breach

Are you from The Crew of SOC, Network Security, or Security Supervisor or CSO? Acquire Perimeter’s Manual to how cloud-essentially based totally totally, converged community safety improves safety and reduces TCO.

  • Realize the importance of a nil believe procedure
  • Complete Network safety Pointers
  • Be aware why relying on a legacy VPN is now not any longer a viable safety procedure
  • Get ideas on tricks on how to present the trip to a cloud-essentially based totally totally community safety solution
  • Explore the advantages of converged community safety over legacy approaches
  • Be aware the tools and applied sciences that maximize community safety

Adapt to the changing menace panorama with out considerations with Perimeter 81’s cloud-essentially based totally totally, unified community safety platform.

Ahead of Google Chrome 123.0.6312.86, form confusion in WebAssembly allowed a much away attacker to lag arbitrary code by arrangement of a crafted HTML page.

KAIST Hacking Lab’s Seunghyun Lee (@0x10n) exploited a high-severity consume-after-free in WebCodecs tracked as CVE-2024-2886; he got $9 Grasp of Pwn components and $85,000 on the 2d day of Pwn2Own contest.

Ahead of Google Chrome 123.0.6312.86, consume after free in WebCodecs allowed a much away attacker to realize arbitrary read/write by arrangement of a crafted HTML page.

Assorted Security Factors Addressed

A vital consume after free in ANGLE has been tracked as CVE-2024-2883. Cassidy Kim (@cassidy6564) reported the dispute, and Google awarded her a $10,000 reward for it.

The vulnerability enabled a much away attacker to almost certainly exploit heap corruption using a crafted HTML page.

A high severity Utilize after free in Crack of break of day identified as CVE-2024-2885. Researcher Wgslfuzz reported the topic. Google Chrome didn’t present the information about the reward for this vulnerability.

By using a specially designed HTML page, the vulnerability may well perchance non-public allowed a much away attacker to rob perfect thing about heap corruption.

How To Update?

To peek a number of the in model version on desktop devices, Google Chrome users can navigate to Menu > Merit > About Google Chrome or form chrome://settings/abet into the take care of bar.

The browser looks to be for updates as rapidly because the accept field is accessed; it downloads and installs any that it finds. It ought to detect and set up a number of the up-to-date version.

To assemble the update, the browser ought to be restarted.

“Get entry to to malicious program vital components and hyperlinks may well perchance almost certainly almost certainly be kept restricted except a majority of users are updated with a repair.

We may well perchance also protect restrictions if the malicious program exists in a third-party library that diversified projects equally rely on nonetheless haven’t but mounted”, Google said.

There shouldn’t be a indication from Google that any of these vulnerabilities are being ragged in the wild.

Google recommends that users update to a number of the in model version of Google Chrome to forestall exploiting vulnerabilities.

Notably, Mozilla also addresses two zero-day vulnerabilities tracked as CVE-2024-29944 and CVE-2024-29943 that had been these days exploited by Manfred Paul (@_manfp) at the Pwn2Own hacking contest in the Firefox net browser.

Preserve updated on Cybersecurity data, Whitepapers, and Infographics. Apply us on LinkedIn & Twitter.

Source credit : cybersecuritynews.com

Related Posts