Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Google wants you to update Chrome right now (ZERO-DAY Exploit in Chrome Browser)
TechSpot ^ | Mar 7, 2019 | Dean Pennington

Posted on 03/08/2019 7:49:10 AM PST by dayglored

Bottom line: Google is urging Chrome users to update their browsers immediately after a zero-day exploit that could give hackers direct access to a user's OS has been found. The most recent version is 72.0.3626.121, and it's the version you want to be running to make sure you're safe from this exploit.

Google is urging users to update Chrome across all platforms after a critical vulnerability was discovered and patched.

The vulnerability exploits a security flaw known as CVE-2019-5786. The security flaw is a memory management issue in Chrome's FileReader which gives hackers the opportunity to inject and execute malicious code.

FileReader is a embedded program in most browsers that allows web apps to read the contents of a user's local file system. The vulnerability identified by Google allows malicious code to leave Chrome's security environment and run commands on the underlying OS.

Well-known Chrome security researcher Justin Schuh concisely addressed the urgency of this update on Twitter:

Also, seriously, update your Chrome installs... like right this minute. #PSA

— Justin Schuh (@justinschuh) March 6, 2019

Google is calling this a "zero-day" vulnerability, meaning that the bad guys figured out how to exploit it before the good guys were able to find and patch it.

The version of Chrome you should be running is 72.0.3626.121, released at the beginning of March 2019. To check your version number, type chrome://settings/help into the address bar. From there, you will be able to see your version number. Just going to that page will trigger an update check, and Chrome will prompt you to relaunch it when finished. You can also manually download the latest version of Chrome here.

Stay safe out there.


TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: chrome; google; windowspinglist; zeroday
Navigation: use the links below to view more comments.
first previous 1-2021-4041-47 next last
To: Leaning Right

Run these two (free) programs ... Malwarebytes and Malwarebytes AdwCleaner.


21 posted on 03/08/2019 8:16:59 AM PST by oh8eleven (RVN '67-'68)
[ Post Reply | Private Reply | To 13 | View Replies]

To: dayglored

No thanks.


22 posted on 03/08/2019 8:20:09 AM PST by semaj (We are the People)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

My bank is telling me I cannot perform a particular transaction in my accounts unless I use CHROME.

AND I AM FURIOUS.


23 posted on 03/08/2019 8:23:33 AM PST by Maris Crane
[ Post Reply | Private Reply | To 1 | View Replies]

To: oh8eleven

I have used Malwarebytes for years. I just deleted it two days ago because the recent upgrade really slowed my PC down.


24 posted on 03/08/2019 8:29:02 AM PST by Cold Heart (Oregon, tyranny and taxes)
[ Post Reply | Private Reply | To 21 | View Replies]

To: Cold Heart
I've used Malwarebytes for years too. There is a free version - you install the Premium version and it automatically turns into the free version in 7(?) days.
I run mine daily, when I'm off doing other things.
25 posted on 03/08/2019 8:43:17 AM PST by oh8eleven (RVN '67-'68)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Cletus.D.Yokel

Cletus, help! Technodope old lady here. Please tell me what to do. TIA


26 posted on 03/08/2019 8:45:00 AM PST by Bigg Red (MAGA)
[ Post Reply | Private Reply | To 12 | View Replies]

To: dayglored

Thanks for posting. I am uptodate.


27 posted on 03/08/2019 8:46:02 AM PST by plain talk
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bigg Red

If you have a phone, it’s too late. MZ has everything he needs regarding your “LifeLog”.

Update Chrome or to reduce the intrusion, go to a Mozilla platform browser FireFox, PaleMoon). Just remember, everyone has a BACKCHANNEL into your life.


28 posted on 03/08/2019 9:04:35 AM PST by Cletus.D.Yokel (Catastrophic, Anthropogenic Climate Alterations: The acronym explains the science.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: dayglored

I’ve started to do all my browsing in a Virtual Machine instance running in VirtualBox, that has nothing else on it.


29 posted on 03/08/2019 9:06:37 AM PST by dfwgator (Endut! Hoch Hech!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cletus.D.Yokel

I see what you did there.


30 posted on 03/08/2019 9:06:47 AM PST by DainBramage
[ Post Reply | Private Reply | To 28 | View Replies]

To: dayglored; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; ...
if you choose to use the Google Chrome spy browser on your Mac or iOS device, Google is recommending you update it immediately as they’ve found a ZERO DAY vulnerability that should be patched with an update NOW!—PING!


Google Chrome
Cross Platform ZERO DAY Alert Ping!

If you want on or off the Mac Ping List, Freepmail me.

31 posted on 03/08/2019 9:11:13 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: dayglored

Thanx...


32 posted on 03/08/2019 9:13:38 AM PST by JDoutrider
[ Post Reply | Private Reply | To 1 | View Replies]

To: DainBramage

Red
Blue

Green?


33 posted on 03/08/2019 9:16:16 AM PST by Cletus.D.Yokel (Catastrophic, Anthropogenic Climate Alterations: The acronym explains the science.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: dayglored

I upgraded Chrome years ago (by having Firefox, Opera, and Brave instead).


34 posted on 03/08/2019 9:30:25 AM PST by Still Thinking (Freedom is NOT a loophole!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: normbal

LOL.

Agree!

I expect they already have that info, but I’m certainly not going to hand it to them on a silver platter.


35 posted on 03/08/2019 9:39:17 AM PST by generally ( Don't be stupid. We have politicians for that.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: dayglored

“The vulnerability identified by Google allows malicious code to leave Chrome’s security environment and run commands on the underlying OS.”

It’s sad that the OS itself isn’t protected from malicious actions by applications.


36 posted on 03/08/2019 9:40:12 AM PST by cymbeline
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Anyone using goggle Crome already has a Zero-day exploit installed by default.


37 posted on 03/08/2019 10:00:52 AM PST by Revel
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

I uninstalled it and have no plans to reinstall it in the near future.


38 posted on 03/08/2019 10:17:19 AM PST by CedarDave (A better name for US Public Schools: Propaganda Indoctrination Centers)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Hurry to download the latest buggy browser update before it’s too late! Hurry, hurry, hurry!


39 posted on 03/08/2019 10:22:35 AM PST by BradyLS (ODO NOT FEED THE BEARS!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
TECHNICAL DETAILS ALERT

The following excerpt from the Register article I linked above in comment #5 is HIGHLY TECHNICAL and only of interest to our resident techies: software programmers and sysadmins.

The bug, discovered by Googler Clement Lecigne, lies in the FileReader API portion of Chrome, and is a use-after-free() programming blunder. This means the browser can be tricked into marking a block of heap memory as no longer needed, and then uses it again anyway as if it hadn't freed the space.

In between a thread releasing the memory and reusing it, that memory space could by assigned to another part of the browser and altered, for example, while rendering a webpage. When a thread incorrectly reuses that memory space, the data will have been overwritten and significantly changed, leading to confusion and ultimately, potentially, remote code execution.

One way to achieve this would be to craft a webpage that, when loaded, causes a Chrome thread to free memory holding a block of function pointers, then render some HTML or fire up some JavaScript that causes the block to be reallocated, and those pointers overwritten with data contained in the page. Then you wait for the browser to access what it thinks are still valid pointers from the memory block, and jump to them. In reality, it will start running arbitrary code supplied by the attacker's webpage.

Exact details of the flaw are being withheld until enough people are patched. The bug fix was emitted at the start of March, and word of exploitation in the wild emerged this week.

If the above reads like total gibberish to you, please don't fret, just ignore it. :-)
40 posted on 03/08/2019 10:46:57 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-47 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson