Bugs in Google Chrome for Desktop, Warns India’s Cyber Agency

New Delhi, August 20: The Indian Computer Emergency Response Team (CERT-In) has warned users about multiple vulnerabilities in Google Chrome for desktop that can let hackers gain access to their computers. The multiple vulnerabilities could allow a remote attacker to execute arbitrary code and Security restriction bypass on the targeted system, according to an advisory by CERT-In, that comes under IT Ministry.

“These vulnerabilities exist in Google Chrome due to use after free in FedCM, SwiftShader, ANGLE, Blink, Sign-In Flow, Chrome OS Shell; Heap buffer overflow in Downloads, Insufficient validation of untrusted input in Intents, Insufficient policy enforcement in Cookies and Inappropriate implementation in Extensions API,” the cyber agency said.

A hacker could exploit these vulnerabilities by sending specially crafted requests on the targeted system. Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code and Security restriction bypass on the targeted system, said CERT-In. China’s Cyber Watchdog Tries to Assuage Concerns of Internet Firms.

“The vulnerability (CVE-2022-2856) is being exploited in the wild. The users are advised to apply patches urgently,” said the agency. CERT-In also warned about bugs in Apple iOS, iPadOS and macOS and a “remote attacker could exploit this vulnerability by enticing a victim to open a specially-crafted file”.

It also found multiple vulnerabilities in Cisco products again, which could allow the attacker to execute arbitrary code, information disclosure and cross site scripting attack on an affected system. The nation’s premier cyber agency had alerted about bugs in Cisco products in the recent past too.

(The above story first appeared on Morning Tidings on Aug 20, 2022 07:41 PM IST. For more news and updates on politics, world, sports, entertainment and lifestyle, log on to our website morningtidings.com).

Be the first to comment

Leave a Reply

Your email address will not be published.


*