![]() ![]() Google is currently working on issuing a patch for the vulnerability. ![]() However, Google did not specify the potential impact of the vulnerability, likely to prevent any further risk to its customers. Google Chrome does a good job protecting its users from potentially nefarious websites, as we demonstrated in our article on which web browser is the most secure.It was once the only browser to. In the event of a buffer overflow, the affected program will behave incorrectly and allow for attackers to perform remote code execution. On Thursday, Google conceded that it was aware of reports that the flaw was being exploited in the wild, claiming that they were working to issue a patch for the critical severity flaw. Google stated that the flaw stems from a heap-buffer overflow, a type of buffer overflow error in which the region of a process’ memory can suffer from an overflow of data. Days earlier, Apple had launched a thinly veiled attack on Google, with Safari’s privacy by design update exposing its stark differences with Chrome when it comes to the dark art of user. The flaw lies in the V8 open-source web engine and affects version 88 of the popular browser on Mac, Windows, and Linux devices. Google has released a warning to its customers stating that a zero-day vulnerability is being actively exploited by attackers and encouraging Google Chrome browser users to maintain aware of the issue and implement a patch as soon as it is available.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |