Vulnerability Spotlight: Code execution vulnerability in Google Chrome WebGL

Vulnerability Spotlight: Code execution vulnerability in Google Chrome WebGL

 


Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.



The Google Chrome web browser contains a vulnerability that could be exploited by an adversary to gain the ability to execute code on the victim machine. Chrome is one of the most popular web browsers currently available to users. Cisco Talos researchers recently discovered a bug in WebGL, which is a Chrome API responsible for displaying 3-D graphics.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Google to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details


Google Chrome WebGL Buffer11::getBufferStorage code execution vulnerability (TALOS-2020-1127/CVE-2020-6555)


An information disclosure vulnerability exists in the WebGL functionality of Google Chrome 83.0.4103.116 (Stable) (64-bit) and 86.0.4198.0 (Developer Build) (64-bit). Specially crafted JavaScript can cause an out-of-bounds read. The victim must visit a specially crafted, malicious web page to trigger this vulnerability.


Read the complete vulnerability advisory here for additional information. 

Versions tested


Talos tested and confirmed that Google Chrome, version 83.0.4103.61 and the developer build of Chrome version 85.0.4169.0 (64-bit) is affected by this vulnerability.

Coverage


The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.


Snort Rules: 54638, 54639



Support the originator by clicking the read the rest link below.