Author: Melodie Foster
Date: 20th November 2020
Chrome 87 is being rolled out over the next few days which includes a patch for a high-severity vulnerability which could allow a remote attacker to access any TCP or UDP port on a victim’s computer by bypassing security restrictions. The security researcher who found this bug called the attack “NAT slipstreaming.”
An attacker could remotely exploit the flaw, and would be able to bypass security restrictions by persuading a victim to visit a specifically crafted, fake website.
Google have said that the issue is caused by an insufficient policy enforcement in networking.
Included in the update are patches for other high-severity vulnerabilities which Google will not mention any details about until most users have updated their browser.
Other flaws include:
- A use-after-free glitch in the payment’s component of Chrome and a use-after-free error in Google’s PPAPI browser plug-in interface
- Two high-severity “inappropriate implementations” one found in the filesystem component and another in the cryptohome component
- Two heap buffer overflow bugs were found in the UI and clipboard components
Google has also said of its version 87 that it “represents the largest gain in Chrome performance in years.” The latest version includes a 5X reduction in CPU usage by prioritising active tabs as opposed to ones in the background. This should also result in a 1.25 hour increase in battery, so updating your Chrome browser to version 87.0.4280.66 is strongly recommended.
Cyberfort Colocation Services
Cyberfort has invested heavily in secure infrastructure, making us the perfect colocation service provider to host your mission-critical, sensitive and regulated data.
Find out more >
Cyberfort Deep Dives
Cyberfort’s cybersecurity consultants explore issues in cyber threat intelligence, incident planning and data security. Read our whitepapers to help make decisions that benefit your business.
Find out more >