Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Digging Into the Third Zero-Day Chrome Flaw of 2021
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Digging Into the Third Zero-Day Chrome Flaw of 2021

5 years ago Tripwire Guest Authors
Digging Into the Third Zero-Day Chrome Flaw of 2021

Hidden deep in Google’s release notes for the new version of Chrome that shipped on March 1 is a fix for an “object lifecycle issue.” Or, for the less technically inclined, a major bug.

Bugs like these have been common in Chrome, leading some to wonder whether the world’s most popular web browser is as safe as it could be? Google created Chrome as a secure browser and has loaded it with a growing set of security features along the way. Unfortunately, there has also been a history of security problems. This has been highlighted this year, because in just the last three months there have been three zero-day flaws discovered in Chrome. A rate of one flaw a month is … not great.

That said, Chrome is in the unique position of being (by far) the most used web browser. Therefore, far more people are looking for bugs in it than almost any other piece of software. Given that, perhaps it’s not surprising that flaws often turn up. In this article we’ll look at the latest 2021 zero-day flaw and what it tells us about the security of Chrome as a whole.

Another Zero-Day Flaw

Let’s examine this recent flaw. It was being tracked as CVE-2021-21166 and was one of a group of flaws reported to Google by Alison Huffman of Microsoft Browser Vulnerability Research on February 11. Though both Microsoft and Google were careful not to release too many details of the vulnerability – lest it be exploited by criminals – it was one example of a related set of flaws that stem from the way that Chrome handles audio.

Eagle-eyed readers will notice, of course, that this means that the flaw was reported almost a month before Google released a patch for it. This kind of vulnerability, which is known to the software vendor but does not yet have a security fix, is known as a zero-day vulnerability. These kinds of vulnerabilities are particularly dangerous – because they are often exploited by cybercriminals – and have also affected Chrome to a high degree.

This was explicitly noted by a number of analysts, and by Google itself, in relation to the most recent flaws. Google was honest, at least, about the danger posed by this problem – “Google is aware of reports that an exploit for CVE-2021-21166 exists in the wild,” Chrome Technical Program Manager Prudhvikumar Bommana said.

A History of Vulnerabilities

The browser has been affected by more than a few zero-day flaws recently. Google resolved five Chrome zero-days that were actively exploited in the wild in a span of one month between October 20 and November 12 last year.

Two of these flaws affected the way that the browser implements Java. Unlike the most recent vulnerabilities, these were found by anonymous contributors to Google’s bug reporting project. Like the most recent flaws, it took almost a month for Google to fix them.

As notable as the number of flaws, though, is their scope. As I’ve mentioned, Chrome is by far the most-used browser in the world, with some 63.38% of the market. Even small flaws have the potential to affect hundreds of millions of users, which means there will always be unpatched instances of the browser being run somewhere, and these will remain open for exploitation.

This has led some to ask an important question:

Is Chrome Safe?

Unfortunately, this is not an easy question to answer.

That’s because it’s difficult to identify a benchmark to measure Chrome against. Far more people are on the internet than ever before. Most of these people use Chrome. This leads to a conclusion often overlooked by security analysts – Chrome may be the single most-used piece of software in world history.

This fact has some strange and complicated effects. One is that there are more people looking for flaws in Chrome – both malicious hackers and researchers – than almost any other piece of software. In principle, this should mean that the browser is actually one of the safest pieces of software out there, simply because it is the most tested. One school of thought would say, in other words, that the number of zero-day flaws seen in Chrome is evidence that it is being thoroughly tested.

Viewed another way, our society-wide dependence on Chrome is concerning. So many people conduct so much of their business through the browser that a vulnerability has the potential to be more serious than a compromised social media account.

Consider, for instance, the fact that half of all buyers find their homes through the internet, or that, globally, we spend an average of 2-3 hours on social media a day. As a result, the amount of data collected via Chrome becomes worryingly vast. And then, if you want a further scare, consider that Google recently added extra support for remote work because, well, everyone in the world who could was working via Chrome.

The Bottom Line

In this context, the answer to the question “Is Chrome safe?” takes on a new dimension. Whether the software has a good security record, or the fact that it can help you with a variety of other online tasks, is almost arbitrary. The problem is that so much of our work, our social lives, and our whole society relies on one piece of software that any flaw is potentially enormously dangerous.


About the Author: Bernard Brode (@BernieBrode) is a product researcher at Microscopic Machines and remains eternally curious about where the intersection of AI, cybersecurity, and nanotechnology will eventually take us.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Digging Into the Third Zero-Day Chrome Flaw of 2021″ appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Bug, Encryption, Exploit, Finance, Google, Google Chrome, High Severity, Java, Medium Severity, Microsoft, Privacy, Threatpost, TripWire, Vulnerability

Continue Reading

Previous Adware Spreads via Fake TikTok App, Laptop Offers
Next Gigaset Android Update Server Hacked to Install Malware on Users’ Devices

More Stories

  • Cyber Attacks
  • Data Breach

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

7 hours ago [email protected] (The Hacker News)
  • Data Breach

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

13 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
  • DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
  • Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
  • The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT