Memory Security Weekly Report No. 132
Anxinsec Technology
AI-Empowered Cybersecurity Solution and Service Provider for Governments and Enterprises
1、Chrome 111 Update Patches High-Severity Memory Safety Vulnerabilities(3.22)
The latest Chrome update brings patches for eight vulnerabilities, including seven high-severity memory safety vulnerabilities reported by external researchers.
Detailed Information
Google this week announced a Chrome 111 update that brings patches for eight vulnerabilities, including seven flaws that were reported by external researchers.
All seven of the externally reported issues are high-severity memory safety bugs, with four of them described as use-after-free vulnerabilities, a type of bug that could lead to arbitrary code execution, data corruption, or denial of service.
Based on the bug bounty reward handed out ($10,000), the most important of these vulnerabilities is CVE-2023-1528, a use-after-free flaw in Chrome’s Passwords component.
“It hides the password leak detection dialog before displaying the account selector, which means that the password leak detection dialog shouldn’t be opened before you have selected your Google account. An attacker can gain access to the vulnerable password,” Action1 VP Mike Walters told SecurityWeek in an emailed comment.
Next in line is CVE-2023-1529, an out-of-bounds memory access in WebHID, for which Google paid an $8,000 bug bounty.
“The vulnerability can handle empty input reports. It’s possible for a HID device to define its report descriptor so that one or more reports have no data fields within the report. When these reports are received, the report buffer should contain only the report ID byte and no other data. This can be used to define which reports have some data and to filter out reports without data,” Walters said.
Three other use-after-free issues were addressed in PDF, in the ANGLE graphics engine, and in WebProtect. The internet giant says it paid out a $7,000 bounty for the PDF flaw, but has yet to determine the amounts to be paid for the other two bugs.
The latest Chrome 111 update also brings patches for two out-of-bounds read issues in GPU Video and ANGLE. Per Google’s policy, no bug bounty reward will be issued for these flaws, as they were reported by Google Project Zero security researchers.
The internet giant made no mention of any of these vulnerabilities being exploited in attacks.
The latest Chrome release is now rolling out as version 111.0.5563.110 for Mac and Linux and as versions 111.0.5563.110/.111 for Windows.
Reference
https://www.securityweek.com/chrome-111-update-patches-high-severity-vulnerabilities/?web_view=true
领英推荐
2、Cisco Patches High-Severity Vulnerabilities in IOS Software(3.23)
Cisco’s semiannual security updates for IOS and IOS XE software resolve high-severity DoS, command injection, and privilege escalation vulnerabilities.
Detailed Information
Cisco this week published its semiannual IOS and IOS XE software security advisory bundle, which addresses ten vulnerabilities, including six rated ‘high severity’.
The most important are three security bugs that can be exploited by remote, unauthenticated attackers to cause a denial-of-service (DoS) condition.
Tracked as CVE-2023-20080, the first of these flaws impacts the IPv6 DHCP version 6 (DHCPv6) relay and server features of IOS and IOS XE software. Insufficient validation of data boundaries allows an attacker to send crafted DHCPv6 messages to an affected device and cause it to reload unexpectedly.
The second vulnerability, CVE-2023-20072, impacts the fragmentation handling code of tunnel protocol packets and can be exploited by sending crafted fragmented packets to an affected system.
Cisco also addressed CVE-2023-20027, an issue in the implementation of the IPv4 Virtual Fragmentation Reassembly (VFR) feature of IOS and IOS XE software, which exists because large packets are not properly reassembled when VFR is enabled.
The vulnerability can be triggered by sending fragmented packets through a VFR-enabled interface on an affected device.
Another high-severity DoS flaw was resolved in the HTTP-based client profiling feature of IOS XE software for Wireless LAN controllers (WLCs). Tracked as CVE-2023-20067, the issue can be exploited by an adjacent attacker, without authentication.
“This vulnerability is due to insufficient input validation of received traffic. An attacker could exploit this vulnerability by sending crafted traffic through a wireless access point. A successful exploit could allow the attacker to cause CPU utilization to increase, which could result in a DoS condition on an affected device and could cause new wireless client associations to fail,” Cisco explains.
Cisco also addressed an insufficient input validation in the CLI of IOS XE SD-WAN software, which could allow an authenticated attacker to execute commands on the operating system with root-level privileges.
Tracked as CVE-2023-20035, the bug could allow an attacker with limited privileges to take over a vulnerable system.
The sixth high-severity flaw that Cisco addressed this week is CVE-2023-20065, an insufficient restrictions issue in the IOx application hosting subsystem of IOS XE software, which could allow an authenticated attacker to escalate their privileges to those of root.
Cisco’s semiannual IOS and IOS XE software updates also include patches for medium-severity DoS, path traversal, and privilege escalation vulnerabilities.
Reference
https://www.securityweek.com/cisco-patches-high-severity-vulnerabilities-in-ios-software/?web_view=true