Both Chrome and Edge browsers are at risk - How to Protect Yourself Now [Update]

Both Chrome and Edge browsers are at risk - How to Protect Yourself Now [Update]

This has been updated as Google has released a fix for this flaw

Beware: Google Chrome, Microsoft Edge, and similar web browsers also have a serious security flaw for which no fix is yet available [The flaw was revealed yesterday (April 12) by security researcher Rajvardhan Agarwal on Twitter, where he posted an image showing that a locally stored web page "pops a calculator," or remotely controls a PC by launching a calculator app He posted

Agarwal linked to a GitHub page from which a proof-of-concept exploit (a benign hack) can be downloaded; Bleeping Computer reproduced the flaw as seen in the video below

In his first tweet, Agarwal called the vulnerability a "zero-day" flaw, which is actually not strictly accurate, as it is the same flaw that two other researchers used to hack Chrome in last week's Pwn2Own hacking contest

The flaw is in the V8 JavaScript engine used in Chrome, Edge, Opera, Brave, Vivaldi, and several other browsers; Agarwal used a recent change in the publicly available V8 code to hack the Pwn2Own exploit was reverse-engineered

If you are using one of these browsers, don't worry yet This is because Chromium-based browsers are "sandboxed," meaning that the exploits affecting the browser will not "escape" throughout the Windows, macOS, and Linux systems on which the browser is running

Mobile versions of these browsers are also sandboxed, but there is no evidence that this affects them as well

Non-chrome browsers such as Mozilla Firefox and Apple Safari are not affected by this flaw

In order for Agarwal's exploit to work, the browser's sandbox must be disabled; on Windows, this can be done by typing the file path of the Chrome application into a command line window and adding the suffix "--no-sandbox" to execute the command A new Chrome window will open without sandbox protection

Unfortunately, malware can also disable the sandbox Attackers could infect PCs, Macs, and Linux in other ways, and the running malware could use the Agarwal exploit to disable the sandbox and take over the machine

Therefore, make sure you are using the best Windows 10 antivirus program or the best Mac antivirus program to prevent infection

There is no official timetable for when a fix for this flaw will be pushed to Chrome, Edge, and related browsers, but it will likely happen within a few days [Google has provided several other emergency updates to Chrome and Chromium in recent months

Since April 13, when this article was posted, Google has quietly distributed an update that fixes a flaw in V8 and another flaw related to the browser's Blink rendering engine The updated Chrome and Chromium versions are both 8904389128

Brave and Edge also appear to have released updates based on the latest version of Chromium, with Brave's version number matching Chromium's and Edge's being 89077476 As of this writing, Opera (7503969171) and Vivaldi (37221852) both use versions based on earlier versions of Chromium

To update Chrome, Edge, or Brave, click on the Settings icon in the upper right corner of the browser window, scroll down and look for something marked "About" at or near the bottom of the menu Sometimes "About" is hidden in the "Help" menu

In Opera and Vivaldi, first click on the browser icon in the upper left corner of the window, scroll down to "Help," and click "About" in the fly-out menu

Select "About" and a new tab will open, indicating that the browser is up-to-date or that the browser must be restarted to complete the installation of updates

Linux users usually need to run the update package of the day from their distribution to get the latest version of their browser

The V8 flaw discovered by the Pwn2Own conflict was classified by Google as due to "insufficient validation of unreliable input in the x86_64 version of V8"

This suggests that V8 can be tripped up by inputting JavaScript that V8 cannot handle Given that the instruction set specification is "x86-64," ie, 64-bit Intel/AMD chipsets, it is possible that this flaw does not affect the 32-bit version of the Chromium browser or other chipsets, but it is not really known

The Blink flaw, which is credited to "Anonymous," is characterized simply as "Blink use after free" That is, it is possible to "reuse" memory freed by Blink in order to attack Chromium

Whoever "Anonymous" is, they will get an unspecified bug bounty from Google

Sadly for Bruno Keith and Niklas Baumstark, the discoverers of the V8 flaw (or maybe not), they have already split the $100,000 Pwn2Own winnings, so they are not eligible for Google's bug bounty Not eligible

Categories