New Threat Research: Uncovering Adversarial LDAP Tradecraft

Read Threat Research


Google Pushes Emergency Chrome Update to Fix Zero-Day

Google has released an emergency security update for the desktop version of the Chrome web browser, addressing the eighth zero-day vulnerability exploited in attacks this year. The high-severity flaw is tracked as CVE-2022-4135 and is a heap buffer overflow in the GPU, discovered by Clement Lecigne of Google’s Threat Analysis Group on November 22, 2022. “Google is aware that an exploit for CVE-2022-4135 exists in the wild,” reads the update notice. As users need time to apply the security update on their Chrome installations, Google has withheld details about the vulnerability to prevent expanding its malicious exploitation. In general, a heap buffer overflow is a memory vulnerability resulting in data being written to forbidden (usually adjacent) locations in memory. Attackers may use heap buffer overflow exploits to overwrite an application’s memory to manipulate its execution path, resulting in unrestricted information access or arbitrary code execution.

Analyst Notes

Chrome users are recommended to upgrade to version 107.0.5304.121/122 for Windows and 107.0.5304.122 for Mac and Linux, which addresses CVE-2022-4135. To update Chrome, click on Settings → About Chrome, then wait for the download of the latest version to finish → Restart the program.