Google Updates Chrome to Address the Seventh Zero-Day Vulnerability

 


Even though the holidays are approaching, software companies are still hard at work fixing serious security vulnerabilities. Enterprise software company Atlassian, Google, and Microsoft have all released patches for vulnerabilities that have already been used in attacks. Additionally, Cisco fixed a bug that had been rated as so serious that it had a near-maximum CVSS score of 9.9.


Everything you require to know about the November patch releases is provided here.






Google Chrome

With the release of seven security updates for Chrome, including an urgent patch for a flaw already being exploited in actual attacks, Google closed out November strongly. The already exploited vulnerability, identified as CVE-2023-6345, is an integer overflow problem in the open-source 2D graphics library Skia. "Google is aware that there is a public exploit for CVE-2023-6345," the company that makes browsers stated in a warning.




Though Benoît Sevens and Clément Lecigne of Google's Threat Analysis Group reported it, little is known about the fix as of this writing. This suggests the exploit may have something to do with spyware.


The remaining six weaknesses, which Google fixed and assessed as having a high impact, include CVE-2023-6348, a Spellcheck type-confusion bug, and CVE-2023-6351, a libation use-after-free issue.





Google fixed fifteen security flaws in its popular browser earlier this month. Three of the bugs that the software behemoth fixed were classified as extremely serious. The first, tracked as CVE-2023-5480, is an improper implementation issue in Payments, and the second, tracked as CVE-2023-5482, is an inadequate data validation flaw in USB that has an 8.8 CVSS score. CVE-2023-5849, the third high-severity bug, is a USB integer overflow problem.





Mozilla Firefox

Firefox, a browser competitor to Chrome, has patched ten dangers, six of which are considered to have a high impact. WebGL2 blitFramebuffer has an out-of-bound memory access vulnerability (CVE-2023-6204), and MessagePort has a use-after-free problem (CVE-2023-6205).


Meanwhile, the full-screen transition in CVE-2023-6206 might permit clicking on links permission prompts. According to Firefox's parent company Mozilla, "the black fade animation when exiting full screen is roughly the length of the anti-clickjacking delay on permission prompts." "Users could have been tricked into clicking where the permission grant button was going to appear by using this fact."



Memory safety issues CVE-2023-6212 and CVE-2023-6212, each with a CVSS score of 8.8, are present in Thunderbird 115.5, Firefox 120, and Firefox ESR 115.5.


Android by Google


The November Android Security Bulletin from Google lists the fixes that were patched this month, six of which are elevation of privilege bugs, and eight of which are in the Framework. According to a Google advisory, the worst vulnerability might result in local escalation of privilege without the need for additional execution privileges.




Additionally, Google resolved seven System bugs, six of which were classified as extremely serious and one as critical. The critical bug, tracked as CVE-2023-40113, may cause local information to be disclosed without the need for additional execution privileges.






FEATURED VIDEO



Historian Breaks Down Napoleon's Battle Tactics



MOST POPULAR

31 Greatest Cyber Monday Coffee Offers: Makers, Grinders, and Mugs

APPAREL

31 Greatest Cyber Monday Coffee Offers: Makers, Grinders, and Mugs


JAINA GREY




No, iOS 17's NameDrop feature doesn't require you to turn it off.


PRIVACY


No, iOS 17's NameDrop feature doesn't require you to turn it off.


REECE GERSON




How to Adjust the Thermostat: Science Says


RESEARCH


How to Adjust Your Thermostat: Science Says


CHIRIS BARANIUK




How to Write and Be More Productive with Obsidian


APPAREL





How to Use Obsidian for Writing and Productivity

JUSTIN POT



Google's Pixel devices have already received the November update, along with some additional fixes. The November Android Security Bulletin has also started to roll out to some of Samsung’s Galaxy line.


Microsoft

Microsoft has a Patch Tuesday every month, but November's is worth notice. The update fixes 59 vulnerabilities, two of which are already being exploited in real-life attacks. Tracked as CVE-2023-36033, the first is an elevation of privilege vulnerability in Windows DWM Core Library marked as important, with a CVSS score of 7.8. “An attacker who successfully exploited this vulnerability could gain SYSTEM privileges,” Microsoft said.


Meanwhile, CVE-2023-36036 is an elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver with a CVSS score of 7.8. Also fixed in November’s update cycle is the already exploited libWep flaw previously fixed in Chrome and other browsers, which also impacts Microsoft’s Edge, tracked as CVE-2023-4863.


Another notable flaw is CVE-2023-36397, a remote code execution vulnerability in Windows Pragmatic General Multicast marked as critical with a CVSS score of 9.8. “When Windows message queuing service is running in a PGM Server environment, an attacker could send a specially crafted file over the network to achieve remote code execution and attempt to trigger malicious code,” Microsoft said.


Cisco

Enterprise software firm Cisco has issued fixes for 27 security flaws, including one rated as critical with a near maximum CVSS score of 9.9. Tracked as CVE-2023-20048, the vulnerability in the web services interface of Cisco Firepower Management Center Software could allow an authenticated, remote attacker to execute unauthorized configuration commands on a Firepower Threat Defense device managed by the FMC Software.


However, to successfully exploit the vulnerability, an attacker would need valid credentials on the FMC Software, Cisco said.


A further seven of the flaws fixed by Cisco are rated as having a high impact, including CVE-2023-20086—a denial-of-service flaw with a CVSS score of 8.6—and CVE-2023-20063, a code-injection vulnerability with a CVSS score of 8.2.


Atlassian

A critical vulnerability that has already been used in actual attacks has been patched by Atlassian. Attacks using ransomware leverage the Confluence Data Center and Server improper-authorization risk, tracked as CVE-2023-22518. As part of its continuous monitoring and investigation of the CVE, Atlassian reported that it had come across multiple active exploits and reports of threat actors utilizing ransomware.




According to security firm Trend Micro, the Cerber malicious software group is exploiting the vulnerability in its attacks. Cerber has previously attacked Atlassian; in 2021, the malware reappeared following a hiatus and was primarily focused on taking advantage of remote code execution flaws in Atlassian's GitLab servers, according to Trend Micro.


The vulnerability affects all versions of Confluence Data Center and Server and lets an unauthorized attacker reset Confluence and make an administrator account. As per Atlassian, "an attacker can execute all administrative tasks accessible to a Confluence instance administrator using this account, resulting in a complete loss of confidentiality, integrity, and availability."


Tags

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.