Chrome browser gets 11 security fixes with 1 zero-day – update now!

Stable Channel Update for Chrome Desktop

Data Breach
Don’t delay – patch today.

Tags: Google,Google Chrome,Vulnerability

Chrome Browser v104.0.5112.101 and v104.0.5112.102

 

Google Chrome Browser Update Released Intro: The latest update to Google’s Chrome browser is out, bumping the four-part version number to 104.0.5112.101 (Mac and Linux), or to 104.0.5112.102 (Windows).  This new release includes 11 security fixes, one of which is annotated with the remark that “an exploit [for this vulnerability] exists in the wild”, making it a zero-day hole. Zero day refers to when there are zero days before an attack on a software can be executed through a vulnerabilities found by hackers and exploiting parties who have knowledge about the technology beforehand.  With this update, Google has committed itself to helping users stay safe.

Chrome Browser v104.0.5112.101 and v104.0.5112.102 Intro: The latest update to Google’s Chrome browser is out, bumping the four-part version number to 104.0.5112.101 (Mac and Linux), or to 104.0.5112.102 (Windows).  According to Google, the new version includes 11 security fixes, one of which is annotated with the remark that “an exploit [for this vulnerability] exists in the wild”, making it a zero-day hole.  Zero-days are a reminder that there were zero days on which even the most well-informed and proactive user or sysadmin could have been patched.

Google Chrome to release security updates for Mac, Windows and Linux Intro: Google announced the release of Chrome version 104.0.5112.101 (for Mac and Linux) or 104.0.5112.102 (for Windows) that will contain 11 security fixes, 10 of which have been made public in advance of the update release date.  These include fixes for critical vulnerabilities such as one where a malicious website could automatically download malware onto the user’s computer and another vulnerability where an attacker could remotely execute code on a victim’s system without any user interaction required at all; this is especially dangerous given that it can be done by someone with no technical expertise whatsoever!

Google Chrome Releases Update for Security Bugs Intro: Google has released an update to address a number of security bugs in the Chrome browser. The update includes 10 of 11 bugs, with the only missing bug being listed as “No details given”. This is a first step in Google’s work to create new ways for people to receive and show support on their platform – with money.  There are many vendors who restrict access to bug details, but it is common practice these days to release information about vulnerabilities once a majority of users have been updated with a fix.

Google Chrome Browser Update Released Intro: The latest update to Google’s Chrome browser is out, bumping the four-part version number to 104.0.5112.101 (Mac and Linux), or to 104.0.5112.102 (Windows). This update includes 11 security fixes, one of which is annotated with the remark that “an exploit [for this vulnerability] exists in the wild”, making it a zero-day hole – indicating that there were zero days on which even the most well-informed and proactive user or sysadmin could have been patched ahead of the criminals and exploiting parties.   The name zero-day is a reminder that there were zero days on which even the most well-informed and proactive

  • CVE-2022-2852:Use after free in FedCM.
  • CVE-2022-2854:Use after free in SwiftShader.
  • CVE-2022-2855:Use after free in ANGLE.
  • CVE-2022-2857:Use after free in Blink.
  • CVE-2022-2858:Use after free in Sign-In Flow.
  • CVE-2022-2853:Heap buffer overflow in Downloads.
  • CVE-2022-2856:Insufficient validation of untrusted input in Intents. (Zero-day.)
  • CVE-2022-2859:Use after free in Chrome OS Shell.
  • CVE-2022-2860:Insufficient policy enforcement in Cookies.

CVE-2022-2861: Inappropriate implementation in Extensions API

Incorporating ‘zero-day’ flaws, Google Chrome’s newest update (104.0.5112.101 for Mac and Linux, 104.0.5112.102 for Windows) includes 11 security fixes. There is a ‘wild’ exploit for one of the flaws (an ‘annotated’ zero-day vulnerability), as Google mentions. There were no days prior to this release in which even the most knowledgeable and timely user or administrator could have been protected against the Bad Guys. As a result, all users should upgrade immediately.

Schedule Demo: Managed IT

Use Our Online Scheduling Tool

1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION:  Low attack complexity Vendor:  Delta Electronics Equipment:  CNCSoft-B DOPSoft Vulnerabilities:  Stack-based Buffer Overflow, Heap-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to exploit a buffer overflow condition and remotely execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of CNCSoft-B DOPSoft, a human machine interface (HMI), are affected: CNCSoft-B DOPSoft: versions 1.0.0.4 and prior 3.2 VULNERABILITY OVERVIEW 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 Delta Electronics’ CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code. CVE-2023-25177 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H ). 3.2.2 HEAP-BASED BUFFER OVERFLOW CWE-122 Delta Electronics’ CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to heap-based buffer overflow, which could allow an attacker to execute arbitrary code. CVE-2023-24014 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H ). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS:  Critical Manufacturing COUNTRIES/AREAS DEPLOYED:  Worldwide COMPANY HEADQUARTERS LOCATION:  Taiwan 3.4 RESEARCHER Natnael Samson (@NattiSamson), working with Trend Micro’s Zero Day Initiative, reported these vulnerabilities to CISA. 4. MITIGATIONS Delta Electronics has released and recommends users to download CNCSoft-B DOPSoft v4.0.0.82 or later. CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet . Locate control system networks and remote devices behind firewalls and isolate them from business networks. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics . Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies . Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies . Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.CISAraw:b680c393c7275eb37bf471123cfc534d – 2023-06-06T14:50:09.000Z
Read More