Google Chrome Zero-Day Patched Post-Pwn2Own March Exploits
Google has successfully addressed another zero-day vulnerability discovered in the Chrome browser. Tracked as CVE-2024-3159, this high-severity flaw, exploited by security researchers during the recent Pwn2Own hacking contest, posed significant risks to user data and system integrity.
The vulnerability, attributed to an out-of-bounds read weakness in the Chrome V8 JavaScript engine, allowed remote attackers to execute arbitrary code via crafted HTML pages. By exploiting heap corruption, attackers could gain unauthorized access to data beyond the memory buffer, potentially exposing sensitive information or triggering browser crashes.
During the Pwn2Own Vancouver 2024 event, Palo Alto Networks security researchers Edouard Bochin and Tao Yan showcased a double-tap exploit leveraging CVE-2024-3159 to execute arbitrary code on both Google Chrome and Microsoft Edge browsers. Their demonstration earned them a notable $42,500 award and underscored the urgency of addressing such vulnerabilities.
Confirmed! @le_douds and @Ga1ois from Palo Alto used an OOB Read plus a novel technique for defeating V8 hardening to get arbitrary code execution in the renderer. The were aboe to exploit #Chrome and #Edge with the same bugs, earning $42,500 and 9 Master of Pwn points. #Pwn2Own pic.twitter.com/EhFIEntnPw
— Zero Day Initiative (@thezdi) March 21, 2024
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Google swiftly patched the zero-day in the Chrome stable channel, releasing version 123.0.6312.105/.106/.107 for Windows and Mac, and version 123.0.6312.105 for Linux. These updates are set to roll out globally in the coming days, ensuring users are protected against potential exploitation.
This latest fix follows Google’s recent efforts to address vulnerabilities exploited at Pwn2Own Vancouver 2024, including two additional zero-days: a type confusion weakness (CVE-2024-2887) in the WebAssembly (Wasm) standard and a use-after-free (UAF) weakness in the WebCodecs API (CVE-2024-2886). By swiftly releasing patches, Google demonstrates its commitment to enhancing browser security and safeguarding users from emerging threats.
Trending: Understanding PTaaS and SOC
Trending: Offensive Security Tool: WAF Bypass