{"id":88248,"date":"2019-11-04T16:10:59","date_gmt":"2019-11-04T10:40:59","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=88248"},"modified":"2019-11-04T16:15:19","modified_gmt":"2019-11-04T10:45:19","slug":"updated-browser-yet-severe-chrome-zero-day-vulnerability-getting-actively-exploited","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/updated-browser-yet-severe-chrome-zero-day-vulnerability-getting-actively-exploited\/","title":{"rendered":"Have you updated your browser yet? Severe Chrome Zero-day vulnerability getting actively exploited"},"content":{"rendered":"<p>Attention! Are you using Chrome\u00a0as your web browsing\u00a0software\u00a0on\u00a0your Windows, Linux and Mac? High time you update your browser!!<\/p>\n<p>That\u2019s right. With Google recently releasing Chrome version 78.0.3904.87 for Windows, Mac, and Linux, there come\u2019s an urgent warning, requesting billions of users to update their software immediately. The warning comes after news of hackers exploiting two high-severity zero-day vulnerabilities. Apparently, the new Chrome version addresses these vulnerabilities.<\/p>\n<p><strong>What are these zero-day vulnerabilities?<\/strong><\/p>\n<p>According to Google, the following 2 zero-day vulnerabilities have been detected:<\/p>\n<ul>\n<li><strong>CVE-2019-13720<\/strong>\u00a0\u2013 This is basically a use-after-free-bug that has been detected in the audio component of Chrome.<\/li>\n<li><strong>CVE-2019-13721\u00a0<\/strong>\u2013 This again is a user-after-free\u00a0security vulnerability and\u00a0affects the\u00a0PDFium library. This is basically used to view and generate PDF files in your browser, a feature that is commonly required\u00a0by users.<\/li>\n<\/ul>\n<p><strong>How do these vulnerabilities work?<\/strong><\/p>\n<p>A\u00a0<em>user-after-free\u00a0security vulnerability\u00a0<\/em>is basically a memory-corruption flaw that allows modification or corruption of memory data, allowing a hacker to take control of an affected software or system. All that the\u00a0remote attackers need to do, is to escalate privileges on your Chrome web browser by convincing you to click and visit a malicious website. This instantly allows attackers to run malicious code on your affected system while bypassing any sandbox protections.<\/p>\n<p><strong>How can you protect yourself?<\/strong><\/p>\n<p>The use-after-free vulnerability has been existing in the wild for quite some time now and is one of the\u00a0most commonly discovered\u00a0vulnerabilities. Thus, the chances of it reappearing in frequent periods are high.<\/p>\n<p>Thankfully, Google has already released an update for this new Chrome version, to patch this active zero-day vulnerability and the <a href=\"https:\/\/chromereleases.googleblog.com\/2019\/10\/stable-channel-update-for-desktop_31.html\">stable channel has been updated<\/a> to 78.0.3904.87. So now, all you need to do is to\u00a0Click on the\u00a0<em>update\u00a0<\/em>arrow visible at the top-right corner of Chrome browser. Once you have successfully updated to\u00a0the latest version of Chrome across your desktop and mobile, you will become safe from these vulnerabilities.<\/p>\n<p>Such security bugs and vulnerabilities are bound to appear and reappear from time to time. It is for this reason that Quick Heal strongly recommends that you keep your web browser and security products up-to-date and follow <a href=\"https:\/\/blogs.seqrite.com\/strengthen-business-cybersecurity\/\">best security practices<\/a> for optimum defense against the rising\/evolving threats and zero-day vulnerabilities.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attention! Are you using Chrome\u00a0as your web browsing\u00a0software\u00a0on\u00a0your Windows, Linux and Mac? High time you update your browser!! That\u2019s right. With Google recently releasing Chrome version 78.0.3904.87 for Windows, Mac, and Linux, there come\u2019s an urgent warning, requesting billions of users to update their software immediately. The warning comes after news of hackers exploiting two [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":88251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[92,45,36,1395,1654],"tags":[],"class_list":["post-88248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-google","category-mac-os","category-security-patch","category-vulnerability","category-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88248"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=88248"}],"version-history":[{"count":1,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88248\/revisions"}],"predecessor-version":[{"id":88250,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88248\/revisions\/88250"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/88251"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=88248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=88248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=88248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}