Critical remote code execution vulnerabilities recently patched the V8 JavaScript and WebAssearch engine used in Google Chrome and Chromium-based browsers.
The problem relates to a case of post-free use of instructional optimization elements, the successful exploitation of which “may allow an attacker to execute code arbitrarily in the context of the browser.”
Error, which Was identified In the Dave Channel version of Chrome 101, Weibo Wang, a security researcher at the Singapore Cybersecurity Company, reports to Google. Number cyber technology And has since been silently revised by the company.
“This vulnerability occurs during instruction selection, where incorrect instruction is selected and this results in memory access exceptions.” Wang said.
After-use-free error Will happen When pre-free memory is accessed, it induces unpredictable behavior and crashes a program, using malicious data, and even achieves arbitrary code execution.
Of further concern is that the error can be remotely run arbitrary code through a specially designed website to bypass security restrictions and compromise with targeted systems.
“This vulnerability can be further exploited by using pile spray techniques, and then ‘type confusion’ leads to vulnerabilities,” Wang explained. “Weakness allows an attacker to control function pointers or write code in arbitrary positions in memory and eventually lead to code execution.”
The company has not yet revealed its weakness through this Chromium bug tracker The portal allows users to install pre-patched versions as much as possible. Also, Google does not assign CVE IDs to vulnerabilities found in unstable Chrome channels.
Chrome users, especially developers who use the Dave version of Chrome for testing to make sure their applications are compatible with recent Chrome features and API changes, should update to the latest available version of the software.
TurboFan assembly instructions after patching vulnerabilities |
This is not the first time that V8-free vulnerabilities have been discovered in the V8 Google has tackled seven such bugs in Chrome in 2021 that have been exploited in real-world attacks. This year, it has also fixed an after-use vulnerability to an actively exploited use of animation material.