Google Patched High-Severity Zero-Day in Chrome

0 0
Read Time:2 Minute

Google’s Chrome Browser Update to Patch Zero-Day Vulnerability

Google has released an update for its Chrome browser to address a high-severity zero-day vulnerability. This vulnerability poses a significant threat as it allows attackers to remotely execute malicious code on end user devices. Notably, this latest patch is the fifth security update rolled out by Google in response to existing malicious exploits targeting the browser throughout the year.

The Vulnerability – CVE-2024-4671

The zero-day vulnerability, identified as CVE-2024-4671, falls into the category of a “use after free” bug commonly found in C-based programming languages. These languages require developers to allocate memory space for running specific applications or operations using pointers that store corresponding memory addresses. Proper deallocation of memory locations is essential once the application or operation no longer necessitates it.

However, use-after-free bugs arise when the pointer fails to clear after freeing the memory location, leading to potential misuse. In such instances, the freed memory pointer might inadvertently point to a new memory location embedded with malicious shellcode planted by an attacker. Upon exploitation, this condition triggers the execution of the injected code, resulting in unauthorized control of the affected device.

Response and Mitigation

Following the discovery of the vulnerability by an anonymous source, Google promptly acknowledged the severity of the issue, assigning it a rating of 8.8 out of 10. Consequently, the tech giant announced its plans to deploy updated versions, namely 124.0.6367.201/.202 for macOS and Windows and 124.0.6367.201 for Linux, in the coming days to safeguard users against potential exploits.

It is crucial to note that Google confirmed the presence of an active exploit for CVE-2024-4671 in the wild, emphasizing the critical need for users to remain vigilant and update their Chrome browsers promptly once the patches are made available. Nevertheless, Google refrained from divulging additional information concerning the exploit’s specifics such as targeted platforms, threat actors, or intended malicious activities.

See also
Navigating Data Retention: How to Address Obsolete Data

Google’s Ongoing Efforts

This latest security update adds to the series of zero-day fixes already implemented by Google in Chrome this year. Notably, three of the previous vulnerabilities were successfully used by researchers participating in the Pwn-to-Own exploit contest, highlighting the critical importance of continuous vigilance against emerging threats.

Google Chrome users are strongly advised to ensure that their browsers are set to automatically update to the latest versions. In cases where manual intervention is warranted, users can navigate to the Settings menu and select the About Chrome option to verify their browser’s current version status. If necessary, users can initiate the update by clicking on the Relaunch button.

By proactively addressing vulnerabilities and swiftly issuing patches, Google remains committed to enhancing user security and fortifying its browser against potential cyber threats, underscoring the collective importance of maintaining robust cybersecurity measures in today’s digital landscape.

Image/Photo credit: source url

About Post Author

Chris Jones

Hey there! 👋 I'm Chris, 34 yo from Toronto (CA), I'm a journalist with a PhD in journalism and mass communication. For 5 years, I worked for some local publications as an envoy and reporter. Today, I work as 'content publisher' for InformOverload. 📰🌐 Passionate about global news, I cover a wide range of topics including technology, business, healthcare, sports, finance, and more. If you want to know more or interact with me, visit my social channels, or send me a message.
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %