Google patches chrome zero-day vulnerabilities being exploited in the wild

Threat Level – Red | Vulnerability Report
Download PDF

For a detailed advisory, download the pdf file here.

Google just released a major security update for Google Chrome that addresses eleven vulnerabilities, including two zero-day flaws that have been exploited in the wild. A remote attacker might take use of the flaws by tricking an unsuspecting victim into visiting a specially designed website they generated, which would cause a type confusion error, allowing them to run arbitrary code on the affected system. Users are advised to update their browsers to the latest version (91.0.4472.164) as soon as practicable.

Vulnerability Details

CVE IDAffected CPEsVulnerability Name
CVE-2021-30632cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*Out of bounds write in V8 JavaScript Engine
CVE-2021-30633cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*Use after free in the Indexed DB API.
CVE-2021-30625cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*Use after free in Selection API
CVE-2021-30626cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*Out of bounds memory access in ANGLE
CVE-2021-30627cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*Type Confusion in Blink layout
CVE-2021-30628cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*Stack buffer overflow in ANGLE
CVE-2021-30629cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*Use after free in Permissions
CVE-2021-30630cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*Inappropriate implementation in Blink
CVE-2021-30631cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*Type Confusion in Blink layout

References

https://threatpost.com/google-chrome-zero-day-exploited/169442/

https://www.securitymagazine.com/articles/96096-google-patches-chrome-zero-day-exploited-in-the-wild

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox