Google has addressed three serious vulnerabilities affecting its Chrome browser that can be exploited to escape the built-in sandbox.
The tech giant released Chrome 77 update in September that addressed two use-after-free vulnerabilities that could lead to sandbox escape. The two flaws have been reported by Man Yue Mo of the Semmle Security Research Team that was rewarded of $20,000 each.
This month Google released Chrome 78 along with a Chrome 77 update that address three other “high severity” vulnerabilities reported by the same researchers. Chrome 78 addressed a total of 37 vulnerabilities.
The vulnerabilities are a use-after-free issue in the audio component tracked as CVE-2019-13695, a use-after-free in the media component tracked as CVE-2019-13699, and a buffer overrun in the Blink browser engine tracked as CVE-2019-13700.
An attacker could exploit the vulnerabilities to execute arbitrary code inside the sandbox and potentially escape it, they could be chained with other flaws to compromise the target computer.
Google awarded the researchers with $15,000, $20,000 and $15,000, respectively.
Semmle donated the overall awards ($95,000) to an unnamed organization, let’s remember that Google doubles the amount of bug bounty if the researchers donate them to a registered charity.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – iCloud, zero-day)
[adrotate banner=”5″]
[adrotate banner=”13″]
Security Affairs Malware newsletter includes a collection of the best articles and research on malware…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles…
Chinese "kill switches" found in Chinese-made power inverters in US solar farm equipment that could…
FBI warns ex-officials are targeted with deepfake texts and AI voice messages impersonating senior U.S.…
Google warns that the cybercrime group Scattered Spider behind UK retailer attacks is now targeting…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium, DrayTek routers, and SAP NetWeaver…
This website uses cookies.