Google stepped out of band this week to patch two Chrome zero-day vulnerabilities currently being exploited in the wild that researchers say if left unpatched could allow hackers to compromise user devices.
The company addressed CVE-2020-16009 on the desktop and released Chrome for Android version 86.0.4240.185 as a fix for CVE-2020-16010. that Chris Hazelton, director of security solutions at Lookout, said would allow “a remote attacker, who had compromised the renderer process [to] perform a sandbox escape using a crafted HTML page and successfully exploit the vulnerability, allowing an attacker to compromise the device.”
The Android vulnerability, which affects all versions but the most current, is the result of a heap buffer overflow flaw while processing untrusted HTML content in the UI in Google Chrome on Android that would allow attackers to mount data on to a buffer beyond its capacity and corrupt data to overwrite memory or a program function, resulting in a crash or memory corruption.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.