Saturday, November 23, 2024

Google Chrome warning issued for all Windows users

If you are one among the billion-plus users of Google Chrome on Windows, you have just been warned to update your browser now…

Google Chrome dominated within the desktop browser market, meaning it’s the usual for over a billion Windows users. Google’s latest Chrome security update was reasonably muted. Yes, there have been a handful of patches in the combo – although nothing too exciting. The more interesting news was the default Windows Hello login. However, normality has now been restored and a more urgent update warning has just been issued. So the same old advice applies: update Chrome as soon as possible.

Stable channel 123.0.6312.86/.87 incorporates a critical security fix for CVE-2024-2883 and there are also three high-risk fixes. As Google explains: “Critical severity issues allow an attacker to execute arbitrary code on the underlying platform with the user’s privileges during the normal course of browsing.”

MORE FROM FORBESGoogle’s latest AI search goes horribly unsuitable – M is for malware

In short, that is a difficulty where a maliciously crafted website could exploit a memory vulnerability in your PC, potentially giving access to an attacker.

Google doesn’t release detailed details about such security issues until it gives users time to update their browsers. As soon because it becomes public, the clock starts ticking and the danger of exploitation increases. But Google “aims to roll out the patch to all Chrome users in less than 30 days” if it is important, which illustrates the urgency here.

The variety of vulnerability observed here is known as “use after free”. This signifies that the pointer to a memory location on the device just isn’t deleted once that memory is freed. This pointer to the now free memory might be exploited by an attacker as a part of an attack chain. There continues to be no indication that this current vulnerability has been exploited. Two of the three patched high-risk vulnerabilities are also UAF.

As Kaspersky explains: “Because dynamic memory is constantly being reallocated, programs must constantly check which sections of the heap are free and which are occupied.” Headers help here by pointing to allocated memory areas. Each header incorporates the beginning address of the corresponding block. UAF bugs arise when programs don’t properly manage these headers.”

MORE FROM FORBESYes, you possibly can export your WhatsApp chats to Telegram – but don’t do this

When this happens: “When the program then allocates the same block of memory to another object (e.g. data entered by an attacker), the dangling pointer now points to this new record.” In other words, UAF vulnerabilities enable code substitution “, which suggests tricking the device into executing malicious code.

You should set Chrome to update robotically, but as with all apps and platforms, if there is a critical patch, it’s price checking that the update has been downloaded and installed. If not, you must do that manually as soon because it becomes available.

You have been warned…

Latest news
Related news