Google urged Chrome users to update the new version immediately to fix the vulnerability
Immediately after reading this article, you must remember to update your Google Chrome immediately to the latest version!
On March 6, security researcher Clement Lecigne of Google Threat Analysis Group discovered and reported a serious security vulnerability that appeared in Chrome around the end of last month, which could allow someone to arbitrary attacks execute remote code and simultaneously take complete control of targeted computers.
This vulnerability is named CVE-2019-5786, and directly affects the Chrome platform that works on all popular operating systems, from Windows, macOS, to Linux.
- Supercomputers can completely detect cyber threats
The Threat Analysis Group has yet to disclose more technical details about this vulnerability, only to announce that this is essentially a use-after-free vulnerability that appears in Chrome's FileReader component, leads to remote code execution.
So what's more disturbing here? Google has warned that this zero-day RCE is being actively exploited by attackers to target Chrome users, especially those with high-end users who don't have much knowledge of security.
'Access to details and link errors can be restricted until most Chrome users are updated with a fix. In addition, we will also maintain restrictive measures if this error still exists in a third-party library that other similar projects are dependent on. The work is being urgently deployed by Google '.
FileReader is a standard API designed to allow synchronized web applications to read the content of files (or raw data buffers) stored on a user's computer, using "File" or "Blob" to specify the file or data object to read.
- Windows 10 KB4482887 update is officially released with Specter patch
The use-after-free vulnerability is a type of memory-related error, causing the memory to be corrupted or allowing data to be modified in memory, making the user completely deprived of privileges on the system or affected software.
The use-after-free vulnerability in the FileReader component can allow non-privileged attackers to now gain important rights in the user's Chrome browser, helping them to get rid of measures. Protection from sandbox and arbitrary code execution on targeted systems.
Basically, to exploit this vulnerability, all the attacker needs to do is trick the victim into opening or redirecting to a specially designed website without any other interaction.
- Install the patch immediately for Windows Server & Windows 10 to run IIS so that it will not be attacked by DOS
Google is calling all its users to update immediately to the latest version of Google Chrome 72.0.3626.121, released on March 1, 2019 for Windows, Mac and Linux operating systems. Google also mentioned that, manually updating Chrome, the patch is now available to all users.
You should read it
- Google Chrome has a function to warn users about MitM attacks
- Microsoft warns of Windows BlueKeep attacks
- Google launched Chrome 33, patched 7 new security bugs
- ProFTPD remote code execution vulnerability affects more than 1 million servers worldwide
- Google found 7 security bugs on the famous network software Dnsmasq
- The unsafe 'feature' on UC Browser allows hackers to take control of Android phones remotely
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
- The security flaw threatens more than 2 billion Google Chrome users
May be interested
- Google Chrome again urgently updates to patch serious security holesgoogle just rolled out another urgent update to its chrome browser for windows, mac, and linux to patch four security holes. among these is a serious zero-day vulnerability that is being actively exploited by hackers.
- What's new on Google Chrome 3.0 version?the new chrome 3.0 browser version of google promises to load the web faster, allowing to customize themes and update new tabs
- Google Chrome 39 updates, officially supports 64-bit for OS Xas promised in september, google launched a 64-bit version of the chrome browser for mac after a few months of beta. according to google's initial announcement, the update supports 32-bit extensions and requires all developers to update with 64-bit support.
- Google released Chrome 24 the fastest everonly one day after mozilla released a new version of firefox, google immediately responded with the release of chrome 24, significantly improving processing speed and being considered the fastest version of chrome ever. now.
- Google Chrome released Chrome 15 betagoogle is ready to push google chrome 15, which is currently in dev channel, beta channel, allowing users to test new and smooth features before chrome 15 ...
- Google released Chrome 11, patching 27 bugson april 27, 2011, google patched 27 vulnerabilities in chrome by bringing the browser to version 11 running on windows, mac and linux. the $ 16,500 bonus was paid by the company to researchers who reported the majority of the errors.
- Missed updating Chrome, how to return to the old interface?yesterday, google released a 69 stable google chrome update, celebrating the browser '10-year birthday anniversary by many users around the world.
- Serious security vulnerability on AMD CPUs has been patchedusers need to update the microcode patch immediately to ensure security.
- How to Update Google Chrome Browserin this article, wikihow will show you how to update the google chrome browser on computers and mobile devices. although google chrome is usually set to update automatically, you can enable manual updates on your mobile device using the mobile app store or on your computer by visiting the 'about google page'. chrome' (about google chrome).
- Google Chrome has a serious zero-day error, and hackers can execute malicious code at its fullestthis vulnerability allows hackers to bypass the content security policy (csp) rules that were released in chrome 73. luckily, google has a patch for this vulnerability now.