Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Chrome 77 Released with 52 Security Fixes

Google this week released Chrome 77 in the stable channel with various fixes and improvements, including 52 security patches.

Google this week released Chrome 77 in the stable channel with various fixes and improvements, including 52 security patches.

Thirty-six of all security fixes are for vulnerabilities reported by external researchers. These include one Critical bug, eight High severity issues, 17 Medium risk flaws, and 10 Low severity vulnerabilities.

The most important of the patches addresses a Critical use-after-free vulnerability in the media component. Tracked as CVE-2019-5870, the bug was reported by Guang Gong of the Alpha Team at Qihoo 360 on August 29. Google has yet to reveal information on the reward paid for the finding.

The first of the High severity bugs patched in Chrome 77 is a heap overflow in Skia (CVE-2019-5871), for which Google paid a $7,500 reward to the reporting researcher.

Google also addressed a use-after-free in Mojo (CVE-2019-5872), URL bar spoofing on iOS (CVE-2019-5873), and an issue with external URIs triggering other browsers (CVE-2019-5874), and awarded $3,000 in bug bounties for each of them.

Another High risk issue was a URL bar spoof via download redirect (CVE-2019-5875), for which Google paid a $2,000 bounty.

The Internet giant has yet to provide information on the bounty rewards paid for the last three High severity vulnerabilities reported by external researchers. These include use-after-free in media (CVE-2019-5876), out-of-bounds access in V8 (CVE-2019-5877), and use-after-free in V8 (CVE-2019-5878).

Medium severity bugs addressed with this release include extensions being able to bypass same origin policy, SameSite cookie bypass, arbitrary read in SwiftShader, URL spoof, full screen notification overlap, full screen notification spoof, CSP bypass, IDN spoof, and CSRF bypass.

Advertisement. Scroll to continue reading.

Other Medium risk issues include multiple file download protection bypass issues, a side channel using storage size estimate, URI bar spoof when using external app URIs, global window leak via console, HTTP authentication spoof, V8 memory corruption in regex, dialog box failing to show origin, and cross-origin information leak using devtools.

The Low severity bugs fixed in Chrome 77 have been described as IDN spoofing, extensions being disabled by trailing slash, Google URI shown for certificate warning, Chrome web store origin requiring isolation, download dialog spoofing, user gesture needed for printing, IP address spoofing to servers, bypass on download restrictions, site isolation bypass, and exceptions leaked by devtools.

To date, Google paid a total of over $33,000 in bug bounties to the researchers who reported the bugs addressed in Chrome 77. However, the search giant has yet to provide information on the rewards paid for over a dozen vulnerabilities.

The latest Chrome iteration is available for download for Windows, Mac and Linux as version 77.0.3865.75.

Related: Chrome 76 Patches 43 Vulnerabilities

Related: Chrome OS 75 Adds More Mitigations for Intel MDS Flaws

Related: Google Boosts Chrome Protection Against Deceptive Sites

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.