The first security patch for Googleâ€™s new Chrome browser is out, fixing at least two â€œcriticalâ€ vulnerabilities that put Windows users at risk of code execution attacks.The patch is rolled out automatically via Chromeâ€™s auto-update feature.
From the release notes:
- Fixes a buffer overflow vulnerability in handling long filenames that display in the â€œSave Asâ€ dialog. This is a critical risk that could lead to execution of arbitrary code. Fix details here
- Fixes a buffer overflow vulnerability in handling link targets displayed in the status area when the user hovers over a link. This is a critical risk that could lead to execution of arbitrary code. The issue was reported privately to Google. Fix details here.
- Fixes an out of bounds memory read when parsing URLs ending with :%. This is a low risk that can be used to crash the entire browser, possibly causing loss of data in the current session. Fix information here.
- The update also changes the default Downloads directory if it is set to Desktop to ensure that Desktop cannot be the default. This mitigates the risk of malicious cluttering of the desktop (aka carpet bombing) with unwanted downloads, which can lead to executing unwanted files.
Related Post :