Google addressed the sixth Chrome Zero-Day vulnerability in 2023

11 months ago 58
BOOK THIS SPACE FOR AD
ARTICLE AD

Google addressed the sixth Chrome Zero-Day vulnerability in 2023

Pierluigi Paganini November 29, 2023

Google released security updates to address a new actively exploited zero-day vulnerability, tracked as CVE-2023-6345, in the Chrome browser.

Google on Wednesday released security updates to address a new actively exploited zero-day, tracked as CVE-2023-6345, in the Chrome browser.

The CVE-2023-5217 is a high-severity integer overflow in Skia. Skia is an open-source 2D graphics library that provides common APIs that work across a variety of hardware and software platforms. It serves as the graphics engine for Google Chrome and ChromeOS, Android, Flutter, and many other products.

Skia’s primary purpose is to render graphics efficiently and accurately on a variety of devices and under different operating systems.

Benoît Sevens and Clément Lecigne of Google’s Threat Analysis Group discovered the zero-day on on 2023-11-24. The fact that the issue was discovered by Google TAG suggests it was exploited by a nation-state actor or by a surveillance firm.

“The Stable channel has been updated to 119.0.6045.199 for Mac and Linux and 119.0.6045.199/.200 for Windows, which will roll out over the coming days/weeks.” reads the advisory published by Google.

“Google is aware that an exploit for CVE-2023-6345 exists in the wild.”

Google has released the browser version 119.0.6045.199 that addressed the following issues:

[N/A][1491459] High CVE-2023-6348: Type Confusion in Spellcheck. Reported by Mark Brand of Google Project Zero on 2023-10-10

[$31000][1494461] High CVE-2023-6347: Use after free in Mojo. Reported by Leecraso and Guang Gong of 360 Vulnerability Research Institute on 2023-10-21

[$10000][1500856] High CVE-2023-6346: Use after free in WebAudio. Reported by Huang Xilin of Ant Group Light-Year Security Lab on 2023-11-09

[$7000][1501766] High CVE-2023-6350: Out of bounds memory access in libavif. Reported by Fudan University on 2023-11-13

[$7000][1501770] High CVE-2023-6351: Use after free in libavif. Reported by Fudan University on 2023-11-13

[N/A][1505053] High CVE-2023-6345: Integer overflow in Skia. Reported by Benoît Sevens and Clément Lecigne of Google’s Threat Analysis Group on 2023-11-24

Leecraso and Guang Gong of 360 Vulnerability Research Institute received the highest payout ($31,000) for the Mojo vulnerability tracked as CVE-2023-6347.

CVE-2023-6345 is the sixth actively exploited zero-day vulnerability in Chrome addressed by Google this year, the other ones are:

CVE-2023-2033 (CVSS score: 8.8) – Type Confusion in V8 CVE-2023-2136 (CVSS score: 9.6) – Integer overflow in the Skia graphics library CVE-2023-3079 (CVSS score: 8.8) – Type Confusion in V8 CVE-2023-4863 (CVSS score: 8.8) – Heap buffer overflow in WebP CVE-2023-5217 (CVSS score: 8.8) – Heap buffer overflow in vp8 encoding in libvpx

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, zero-day)



Read Entire Article