Tag Archive for: patch

Google 0-day browser bug under attack, patch available


Google patched a zero-day bug being exploited in the wild that is tied to its Chrome browser and ChromeOS software. The flaw allows an attacker, who is able to compromise the browsers rendering process, to bypass sandbox security measures and execute remote code or access sensitive data.

Tracked as CVE-2023-6345 and rated by Google as a high priority fix, the vulnerability is an integer overflow bug in Chrome’s open source 2D graphics library called Skia. Google is withholding technical details of the vulnerability until fixes have been rolled out to a majority of users and vendors who use the Chromium browser engine in their products.

The patch, which impacts versions of Chrome prior to 119.0.6045.199, is one of seven security updates the company released on Tuesday.

“Google is aware that an exploit for CVE-2023-6345 exists in the wild,” the Google security bulletin stated.

The Skia flaw is an integer overflow that opens unpatched software to a “remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file.”

An attack that involves exploiting a sandbox escape allows an adversary to “break out of a secure or quarantined environment (sandbox)… An attacker could use a sandbox escape to execute malicious code on the host system, access sensitive data, or cause other types of harm,” according to a NordVPN description.

Part of Google’s security bulletin also included patches high-severity bugs including:

The announcement is the latest zero-day bug to affect the popular web browser from Google this year. 

The company patched another zero-day, CVE-2023-5217, in September that was described as a heap buffer overflow in vp8 encoding in the libvpx free codec library that allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Source…

Week in review: Patch Tuesday forecast, 9 free ransomware guides, Cybertech Europe 2023


Week in review

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

Photos: Cybertech Europe 2023
The Cybertech Europe conference and exhibition takes place at La Nuvola Convention Center in Rome, and features the latest innovative solutions from dozens of companies and speakers, including senior government officials, C-level executives, and industry trailblazers from Europe and around the world.

Cybertech Europe 2023 video walkthrough
In this Help Net Security video, we take you inside Cybertech Europe 2023 at La Nuvola Convention Center in Rome.

Securing GitHub Actions for a safer DevOps pipeline
In this Help Net Security interview, Varun Sharma, CEO at StepSecurity, talks about misconceptions about the security of GitHub Actions, the potential risks of using third-party actions, recommended best practices for using GitHub Actions securely, and more.

CISO’s compass: Mastering tech, inspiring teams, and confronting risk
In this Help Net Security interview, Okey Obudulu, CISO at Skillsoft, talks about the increasing complexity of the CISO role and challenges they face.

Tackling cyber risks head-on using security questionnaires
In this Help Net Security interview, Gaspard de Lacroix-Vaubois, CEO at Skypher, talks about the implementation of security questionnaires and how they facilitate assessments and accountability across all participants in the technology supply chain, fostering trust and safeguarding sensitive data.

Chalk: Open-source software security and infrastructure visibility tool
Chalk is a free, open-source tool that helps improve software security.

Critical zero-days in Exim revealed, only 3 have been fixed
Six zero-days in Exim, the most widely used mail transfer agent (MTA), have been revealed by Trend Micro’s Zero Day Initiative (ZDI) last Wednesday.

Zero-day in Arm GPU drivers exploited in targeted attacks (CVE-2023-4211)
A vulnerability (CVE-2023-4211) in the kernel drivers for several Mali GPUs “may be under limited, targeted exploitation,” British semiconductor manufacturer Arm has confirmed on Monday, when it released drivers updated with patches.

Amazon: AWS root accounts must have MFA enabled
Amazon wants to make…

Source…

September 2023 Android security patch here for Pixels


google pixel fold second screen

Ryan Haines / Android Authority

The September 2023 Android security patch is here! If you own a recent Google Pixel smartphone or the Pixel Tablet, you can perform a software update check now in System Settings to grab it. You can also update manually or simply wait for the OTA notification.

With the release of this security patch, we can be pretty certain that Android 14 isn’t coming this month. It’s looking more and more likely we’ll see it debut alongside the Pixel 8 series on October 4. This update only has a handful of security updates, so it’s nothing super exciting. You can see the full changelog here.

If you don’t want to wait for the OTA alert on your Pixel phone or tablet, you can always manually update. To download the factory image or OTA, click the appropriate link below. Don’t have a Pixel? The Google Pixel 7a costs just $499 and will receive software updates until 2028.

Google Pixel 7aGoogle Pixel 7a
AA Editors Choice

Google Pixel 7a

The best sub-$500 camera phone • Solid performance and plenty of RAM • Improved 90Hz display

The essential Pixel experience

The Pixel 7a delivers more premium features than ever for under $500, such as wireless charging support, a 90Hz refresh rate display, and a 64MP camera.

  • Google Pixel Fold
  • Google Pixel Tablet
  • Google Pixel 7a
  • Google Pixel 7 Pro
  • Google Pixel 7
  • Google Pixel 6a
  • Google Pixel 6
  • Google Pixel 6 Pro
  • Google Pixel 5a
  • Google Pixel 5
  • Google Pixel 4a 5G

Source…

New iOS patch shuts down serious exploit


Apple iPhone 14 Pro Max dynamic island angle

Robert Triggs / Android Authority

TL;DR

  • Apple has released security updates for iOS, iPadOS, macOS, and watchOS.
  • The latest patch fixes two zero-day vulnerabilities commonly known as BLASTPASS.
  • The security flaws allow malicious images or attachments to install malware on your Apple device.

If you have an iPhone, iPad, MacBook, or Apple Watch, you will want to update your device as soon as possible. Even if you typically avoid updates, this patch is one you shouldn’t miss, as it fixes two serious bugs.

Apple has released a new update that addresses the zero-day vulnerabilities CVE-2023-41064 and CVE-2023-41061, according to Ars Technica. Zero-day vulnerabilities are security flaws that have been discovered before security researchers or software developers become aware of them, making them a higher risk than other threats.

The updates include iOS 16.6.1, iPadOS 16.6.1, macOS 13.5.2, and watchOS 9.6.2. Unfortunately, it appears there have been no patches rolled out for older OS versions.

CVE-2023-41064 and CVE-2023-41061, better known as BLASTPASS, allow for images and attachments to install malware on your device. For example, loading a malicious image from WhatsApp, iMessage, or Safari could trigger the installation of malware. This cyberattack technique is known as steganography, or the hiding of a file within another file. It works by inserting malicious code in the hidden data that comes with an image.

The security gaps were first reported by the Citizen Lab at the Munk School of Global Affairs & Public Policy at the University of Toronto. Citizen Lab says that BLASTPASS was “being used to deliver NSO Group’s Pegasus mercenary spyware.”

Since Apple is holding its “Wonderlust” event on September 12, this will probably be the last update before the iPhone 15 launches. Apple will likely announce iOS 17 during this keynote.

Source…