할로윈에, 구글, 크롬의 끔찍한 제로데이 취약점 수정

10월의 저녁 31, Google engineers unexpectedly released 크롬 78.0.3904.87 윈도우용, 맥, and Linux. Analysts believe that in this way the company fixed a dangerous 0-day vulnerability in Chrome.

지금이 순간, it is proving hard to find out much specific detail about either of the vulnerabilities concerned, other than the fact that one of the two vulnerabilities fixed by the update is already have been exploited in the wild.

“It takes a lot to scare anyone on Halloween night, but Google Chrome engineers were spooked enough to issue an urgent update announcement for the browser across all platforms. 그래서, what gave Google the heebie-jeebies? The answer is not one but two security vulnerabilities, one of which has a zero-day exploit out in the wild already”, — 쓴다 Forbes observer Davey Winder.

The zero-day vulnerability under attack received the identifier CVE-2019-13720. It presents use-aster-free bug in the audio component of the browser.

또한 읽기: 크롬 78 아직 DNS-over-HTTPS 지원을 활성화하지 않았습니다.

According to a U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) statement, the Google updateaddresses vulnerabilities that an attacker could exploit to take control of an affected system”, but that’s as far as the detail goes.

Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on but haven’t yet fixed.”, — reported Google specialist.

하지만, there is evidence that Kaspersky Lab experts have already discovered a vulnerability and published a detailed analysis of the problem. Experts write that the bug is used to install malware on victimscomputers.

“We are calling these attacks Operation WizardOpium. So far, we have been unable to establish a definitive link with any known threat actors. There are certain very weak code similarities with Lazarus attacks, although these could very well be a false flag”, — write Kaspersky Lab reaserches.

It is noted that the exploitation of the vulnerability was associated with a watering holeattack on a Korean-language news portal, on the main page of which was introduced malicious JavaScript. Such attacks are called by analogy with the tactics of predators who hunt at a watering hole, waiting for preyanimals that came to get drunk. This behavior is more likely similar to the past operations of DarkHotel.

All Chrome users are advised to update their browser to version 78.0.3904.87 최대한 빨리.

저자 소개

발디스 콕

보안 엔지니어, 리버스 엔지니어링 및 메모리 포렌식

코멘트를 남겨주세요