
Just days after Chrome’s 12th and 13th ‘zero day’ exploits of the year were discovered, Google has revealed four ‘High’ rated vulnerabilities have been confirmed. And users need to take immediate action.
Google is currently restricting information about these hacks to buy time for Chrome users to upgrade. Consequently, we only have the following information to go on:
- High – CVE-2021-37977 : Use after free in Garbage Collection.
- High – CVE-2021-37978 : Heap buffer overflow in Blink.
- High – CVE-2021-37979 : Heap buffer overflow in WebRTC.
- High – CVE-2021-37980 : Inappropriate implementation in Sandbox.
Chrome continues to be targeted with Use-After-Free (UAF) exploits. The browser was hit by double digit UAF attacks in September and hackers have already exploited a zero-day UAF flaw in Chrome this month, ahead of the latest discovery.
The listing of a pair of Heap buffer overflow exploits is less expected. Like UAF attacks, this is a memory vulnerability but it has not been a regular avenue for Chrome hacks in recent months. Memory on the heap is dynamically allocated and typically contains program data. With an overflow, critical data structures can be overwritten which makes it an ideal target for attacks.
Chrome version is 94.0.4606.81 or higher, you are safe. If the update is not yet available for your browser, make sure you check regularly for the new version.