A security researcher has identified and reported what appears to be a denial-of-service (DoS) bug affecting current versions of Google Chrome.
Andris Atteka reported on Friday that the bug can be triggered by adding a NULL character in the URL string. The expert published the following example link on his blog: biome3d.com/%%30%30. When the mouse hovers over this URL in Chrome, the browser crashes. The bug is also triggered if a specially crafted URL is clicked or typed into the application’s address bar.
The flaw can cause Chrome to terminate completely or it crashes only the current tab.
“Unfortunately no reward was awarded as this was deemed to be only a DOS vulnerability,” Atteka explained. “Anyway, making secure software is much harder than finding issues in it.”
Atteka reported the issue on September 18 and Chrome developers have been debating on how to fix it ever since.
Google experts say they’ve managed to reproduce the bug on the Android version of the browser and even on Chrome 47 Dev (released on September 15). Android WebView is also said to be affected. SecurityWeek has managed to reproduce the issue on Chrome for Windows, Mac and an older version of Android (4.4.2).
While Chrome developers are working on a fix, San Francisco-based web developer Sean Zhu created a little game that leverages the bug.
The flaw doesn’t pose much of a security risk, but it could impact a large number of users. As Chromium developers have noted, “this is a mess.”

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
- Barracuda Zero-Day Exploited to Deliver Malware for Months Before Discovery
Latest News
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Apple Denies Helping US Government Hack Russian iPhones
