Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
Google has released an emergency update to address a new zero-day vulnerability in its Chrome browser. This high-severity flaw, identified as CVE-2024-4761, is actively exploited in the wild and poses significant risks to users.
The CVE-2024-4761 vulnerability is an out-of-bounds write bug in Chrome’s V8 JavaScript and WebAssembly engine. Discovered and reported anonymously on May 9, 2024, this flaw allows malicious actors to corrupt data, induce crashes, or execute arbitrary code on compromised systems. Specifically, it enables a remote attacker to escape Chrome’s sandbox and perform unauthorised actions beyond the browser’s confines.
An out-of-bounds write occurs when a program writes data outside the memory boundaries allocated to it. This can lead to various security issues, including data corruption and arbitrary code execution. In the case of CVE-2024-4761, an attacker could exploit the bug by creating a crafted HTML page. When a user visits this page, the exploit manipulates memory in a way that bypasses Chrome’s security protections, potentially allowing the attacker to gain control over the affected system.
The disclosure of CVE-2024-4761 follows closely on the heels of another critical vulnerability, CVE-2024-4671, a use-after-free flaw in Chrome’s Visuals component. Together, these vulnerabilities highlight an ongoing trend of zero-day exploits targeting Chrome. Since the beginning of 2024, Google has patched six zero-day vulnerabilities, underscoring the persistent threat landscape for web browsers.
Exploits like CVE-2024-4761 are particularly dangerous because they can lead to a wide range of malicious activities, including data theft, malware insertion, and unauthorised access to sensitive systems. The existence of exploit code in the wild increases the urgency for users to apply security patches promptly.
To protect against CVE-2024-4761 and similar threats, users should:
If you suspect your system has been compromised by this or any other vulnerability, take the following steps:
The discovery of CVE-2024-4761 underscores the importance of maintaining up-to-date software and being vigilant about security threats. By promptly applying updates and following best practices, users can mitigate the risks associated with these vulnerabilities and protect their data from potential exploitation.
Further information available at: