Some versions of Google Chrome browser may have weak security for desktop users

This page was created programmatically, to read the article in its original location you can go to the link bellow:
https://www.thehindu.com/sci-tech/technology/high-severity-vulnerabilities-google-chrome-cert-in/article65853020.ece
and if you want to remove this article from our site please contact us


Vulnerabilities have also been detected due to insufficient validation or untrusted input in v8, an open source Java script and web assembly engine, and insufficient policy enforcement in extensions API

Vulnerabilities have also been detected due to insufficient validation or untrusted input in v8, an open source Java script and web assembly engine, and insufficient policy enforcement in extensions API

Some versions of Chrome browser for desktop users may be prone to multiple vulnerabilities, according to Computer Emergency Response Team (CERT-In). The team noted on Monday that versions prior to 105.0.5195.52 could be vulnerable.

(Sign up to our Technology newsletter, Today’s Cache, for insights on emerging themes at the intersection of technology, business and policy. Click here to subscribe for free.)

CERT-In said vulnerabilities exist after free in network service, webSOL, layout, phonehub, browser tag, tab strip, splitscreen, passwords, sign-In flow heap buffer overflow in screen capture, WebUI, Exosphere and Window manager, inappropriate implementation in site isolation, Chrome OS lockscreen, pointer lock and frame sandbox.

Vulnerabilities have also been detected due to insufficient validation or untrusted input in v8, an open source Java script and web assembly engine, and insufficient policy enforcement in extensions API.

Attackers can exploit these vulnerabilities to execute arbitrary code on affected systems, thereby compromising their security. 

CERT-In also released notes for a security bypass vulnerability detected in Google Chrome. 

The high severity vulnerability has been found to exist due to insufficient data validation in Mojo and can be exploited by remote attackers by executing a specially crafted request. 

CERT-In noted that the vulnerability can be exploited by attackers to bypass security restrictions on affected systems, thereby compromising their safety.

Google in a blog also reported the vulnerability, stating that the stable channel has been updated to version 105.0.5195.102 and will be released for the public in the coming days.

The security bypass vulnerability was first shared by Google on September 2 after an anonymous user brought it to notice. 

This is the second time this month that CERT-In has released notes for vulnerabilities in Google Chrome. Earlier, multiple vulnerabilities were detected in Google Chrome OS that could be used by attackers to execute arbitrary codes or cause denial of services.


This page was created programmatically, to read the article in its original location you can go to the link bellow:
https://www.thehindu.com/sci-tech/technology/high-severity-vulnerabilities-google-chrome-cert-in/article65853020.ece
and if you want to remove this article from our site please contact us

Nabeel Ahmed

Leave a Reply

You have to agree to the comment policy.

one + one =