Posted on 03/08/2019 7:49:10 AM PST by dayglored
Google is urging users to update Chrome across all platforms after a critical vulnerability was discovered and patched.
The vulnerability exploits a security flaw known as CVE-2019-5786. The security flaw is a memory management issue in Chrome's FileReader which gives hackers the opportunity to inject and execute malicious code.
FileReader is a embedded program in most browsers that allows web apps to read the contents of a user's local file system. The vulnerability identified by Google allows malicious code to leave Chrome's security environment and run commands on the underlying OS.
Well-known Chrome security researcher Justin Schuh concisely addressed the urgency of this update on Twitter:
Also, seriously, update your Chrome installs... like right this minute. #PSA
Justin Schuh (@justinschuh) March 6, 2019
Google is calling this a "zero-day" vulnerability, meaning that the bad guys figured out how to exploit it before the good guys were able to find and patch it.
The version of Chrome you should be running is 72.0.3626.121, released at the beginning of March 2019. To check your version number, type chrome://settings/help into the address bar. From there, you will be able to see your version number. Just going to that page will trigger an update check, and Chrome will prompt you to relaunch it when finished. You can also manually download the latest version of Chrome here.
Stay safe out there.
Run these two (free) programs ... Malwarebytes and Malwarebytes AdwCleaner.
No thanks.
My bank is telling me I cannot perform a particular transaction in my accounts unless I use CHROME.
AND I AM FURIOUS.
I have used Malwarebytes for years. I just deleted it two days ago because the recent upgrade really slowed my PC down.
Cletus, help! Technodope old lady here. Please tell me what to do. TIA
Thanks for posting. I am uptodate.
If you have a phone, it’s too late. MZ has everything he needs regarding your “LifeLog”.
Update Chrome or to reduce the intrusion, go to a Mozilla platform browser FireFox, PaleMoon). Just remember, everyone has a BACKCHANNEL into your life.
I’ve started to do all my browsing in a Virtual Machine instance running in VirtualBox, that has nothing else on it.
I see what you did there.
If you want on or off the Mac Ping List, Freepmail me.
Thanx...
Red
Blue
Green?
I upgraded Chrome years ago (by having Firefox, Opera, and Brave instead).
LOL.
Agree!
I expect they already have that info, but I’m certainly not going to hand it to them on a silver platter.
“The vulnerability identified by Google allows malicious code to leave Chrome’s security environment and run commands on the underlying OS.”
It’s sad that the OS itself isn’t protected from malicious actions by applications.
Anyone using goggle Crome already has a Zero-day exploit installed by default.
I uninstalled it and have no plans to reinstall it in the near future.
Hurry to download the latest buggy browser update before its too late! Hurry, hurry, hurry!
The following excerpt from the Register article I linked above in comment #5 is HIGHLY TECHNICAL and only of interest to our resident techies: software programmers and sysadmins.
The bug, discovered by Googler Clement Lecigne, lies in the FileReader API portion of Chrome, and is a use-after-free() programming blunder. This means the browser can be tricked into marking a block of heap memory as no longer needed, and then uses it again anyway as if it hadn't freed the space.If the above reads like total gibberish to you, please don't fret, just ignore it. :-)In between a thread releasing the memory and reusing it, that memory space could by assigned to another part of the browser and altered, for example, while rendering a webpage. When a thread incorrectly reuses that memory space, the data will have been overwritten and significantly changed, leading to confusion and ultimately, potentially, remote code execution.
One way to achieve this would be to craft a webpage that, when loaded, causes a Chrome thread to free memory holding a block of function pointers, then render some HTML or fire up some JavaScript that causes the block to be reallocated, and those pointers overwritten with data contained in the page. Then you wait for the browser to access what it thinks are still valid pointers from the memory block, and jump to them. In reality, it will start running arbitrary code supplied by the attacker's webpage.
Exact details of the flaw are being withheld until enough people are patched. The bug fix was emitted at the start of March, and word of exploitation in the wild emerged this week.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.