• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google patches chrome’s fifth zero day of the year

Google Patches Chrome’s Fifth Zero-Day of the Year

You are here: Home / Latest Cyber Security Vulnerabilities / Google Patches Chrome’s Fifth Zero-Day of the Year
August 18, 2022

Google has patched the fifth actively exploited zero-working day vulnerability learned in Chrome this calendar year as 1 in a sequence of fixes integrated in a stable channel update released Wednesday.

The bug, tracked as CVE-2022-2856 and rated as high on the Frequent Vulnerability Scoring System (CVSS), is linked with “insufficient validation of untrusted enter in Intents,” according to the advisory posted by Google.

Google credits Ashley Shen and Christian Resell of its Google Danger Assessment Team (TAG) for reporting the zero-day bug, which could permit for arbitrary code execution, on July 19. The advisory also unveiled 10 other patches for different other Chrome issues.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Intents are a deep linking characteristic on the Android device within just the Chrome browser that replaced URI strategies, which earlier dealt with this course of action, in accordance to Department, a firm that presents many linking possibilities for cellular applications.

“Instead of assigning window.area or an iframe.src to the URI scheme, in Chrome, builders need to use their intent string as outlined in this doc,” the business explained on its website. Intent “adds complexity” but “automatically handles the case of the cellular application not becoming installed” in just inbound links, in accordance to the post.

Insufficient validation is associated with enter validation, a usually-utilized system for checking probably unsafe inputs to guarantee that they are risk-free for processing inside of the code, or when speaking with other parts, in accordance to MITRE’s Prevalent Weakness Enumeration web page.

“When software does not validate input appropriately, an attacker is in a position to craft the input in a type that is not predicted by the relaxation of the application,” according to a submit on the internet site. “This will direct to elements of the technique acquiring unintended input, which could result in altered regulate move, arbitrary command of a useful resource, or arbitrary code execution.”

Fending Off Exploits

As is common, Google did not disclose specific aspects of the bug until it is widely patched to stay clear of danger actors taking further advantage of it, a method that one security experienced observed is a smart one particular.

“Publicizing particulars on an actively exploited zero-day vulnerability just as a patch gets to be readily available could have dire effects, for the reason that it can take time to roll out security updates to vulnerable methods and attackers are champing at the little bit to exploit these sorts of flaws,” observed Satnam Narang, senior personnel investigate engineer at cybersecurity business Tenable, in an email to Threatpost.

 Holding again info is also audio presented that other Linux distributions and browsers, this sort of as Microsoft Edge, also incorporate code based on Google’s Chromium Venture. These all could be afflicted if an exploit for a vulnerability is unveiled, he claimed.

“It is particularly beneficial for defenders to have that buffer,” Narang extra.

Though the greater part of the fixes in the update are for vulnerabilities rated as substantial or medium risk, Google did patch a critical bug tracked as CVE-2022-2852, a use-just after-totally free issue in FedCM noted by Sergei Glazunov of Google Task Zero on Aug. 8. FedCM—short for the Federated Credential Administration API–provides a use-situation-precise abstraction for federated identification flows on the web, according to Google.

Fifth Chrome 0Day Patch So Considerably

The zero-working day patch is the fifth Chrome bug less than energetic attack that Google has patched so considerably this calendar year.

In July, the corporation preset an actively exploited heap buffer overflow flaw tracked as CVE-2022-2294 in WebRTC, the motor that presents Chrome its true-time communications capability, though in May perhaps it was a individual buffer overflow flaw tracked as CVE-2022-2294 and below energetic attack that bought slapped with a patch.

In April, Google patched CVE-2022-1364, a kind confusion flaw influencing Chrome’s use of the V8 JavaScript engine on which attackers already had pounced. The former thirty day period a individual sort-confusion issue in V8 tracked as CVE-2022-1096 and less than energetic attack also spurred a hasty patch.

February noticed a repair for the initial of this year’s Chrome zero-times, a use-just after-free of charge flaw in Chrome’s Animation component tracked as CVE-2022-0609 that presently was beneath attack. Afterwards it was unveiled that North Korean hackers were being exploiting the flaw months before it was uncovered and patched.

 

 

 


Some pieces of this posting are sourced from:
threatpost.com

Previous Post: «Cyber Security News Quarter of All Gambling Sites Hit by DDoS Attacks in June
Next Post: ATMZOW JS Sniffer Campaign Linked to Hancitor Malware Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.