Vulnerability Management, DevSecOps
Google patches another zero-day exploiting the Chrome browser

The tech giant Google has had to issue two patches for its popular Chrome browser in less than a week, while another of its tools is being used by a threat group. (Photo by Gary Hershorn/Getty Images)
What a tough few days for Google.The tech giant patched a zero-day exploiting the Chrome browser late last week, admitted in its April 2023 Threat Horizons Report released Friday that Chinese threat group APT41 abused its open-source Google Command and Control (GC2) red-teaming tool in malware attacks, and on April 18 reported yet another Chrome zero-day it needed to patch.The new zero-day — CVE-2023-2136 — was described by NIST’s National Vulnerability Database as an integer overflow that appeared in the Skia open-source graphics platform in Google Chrome prior to version 112.0.5615.137.NIST said the vulnerability would let a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. The vulnerability was described as “high severity” and Google acknowledged that it was exploited in the wild. No CVSS score has been issued yet. For the April 18 bug, Google issued a stable channel update with eight security fixes to version 112.0.5615.137/138 for Windows and 112.0.5615.137 for Macs, which will roll out over the coming days. A patch for Linux will come a bit later.Skia is an open-source 2D graphics library which delivers common APIs that work across a variety of hardware and software platforms. It serves as the graphics engine for Google Chrome and ChromeOS, Android, Flutter, and many other products.An integer overflow can happen if a program performs a calculation and the true answer is larger than the available space. Such integer overflows can cause a program to use incorrect numbers and respond in unintended ways, which are then open to exploitation by attackers.Chrome is the most broadly used web browser by a considerable margin, which makes it a natural target for threat actors, said Mike Parkin, senior technical engineer at Vulcan Cyber. Parkin said the nature of browsers also makes them an expected target, since there are so many potential avenues of attack. “Google's been good about patching Chrome quickly when issues come up, which is fortunate,” said Parkin. “While it seems there have been a lot of Chrome vulnerabilities of late, it strikes me that it's part of the usual ebb and flow and not the result of long-term issues in Chrome.”Browser-based vulnerabilities are an attractive target for malicious actors, given that they are installed everywhere and used frequently, said Melissa Bischoping, director, endpoint security research at Tanium. As with many bugs, Bischoping said when one gets discovered by a researcher or from artifacts of a known attack, this leads to additional scrutiny and analysis that may identify multiple adjacent or similar bugs.“While Google doesn't immediately make details available about these bugs, the good news is that Chrome is quick to update once patches are available,” said Bischoping. “For most organizations, applying browser patches is low-risk to operational continuity and an easy win to reduce vulnerability exposure in your environment. This is mostly business as usual for Chrome patching. Google's following their standard procedure for disclosure/patch.”
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds