These vulnerabilities exist in Google Chrome due to ‘Heap Buffer’ overflow in ‘WebRTC’, ‘Type Confusion in V8’ and ‘Use after Free’ in Chrome OS Shell….reports Asian Lite News
The Indian Computer Emergency Response Team (CERT-In), which comes under the IT Ministry, has warned users of multiple vulnerabilities in Google Chrome which could allow a remote attacker to execute arbitrary code and denial-of-service (DoS) conditions on the targeted system.
A remote attacker could exploit these vulnerabilities by sending specially crafted requests on the targeted system.
“Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code and denial-of-service (DoS) conditions on the targeted system,” said CERT-In the advisory late on Wednesday.
These vulnerabilities exist in Google Chrome due to ‘Heap Buffer’ overflow in ‘WebRTC’, ‘Type Confusion in V8’ and ‘Use after Free’ in Chrome OS Shell.
The vulnerability (CVE-2022-2294) is being exploited in the wild, said the cyber agency, adding that the users are advised to apply patches urgently.
CERT-In also advised users against a ‘Remote Code Execution’ vulnerability that has been reported in a Zoho Corporation software which could be exploited by an unauthenticated remote attacker to execute arbitrary code on the targeted system.
This vulnerability exists in ‘Zoho ManageEngine ADAudit Plus’ due to a ‘misconfigured XML’ parser that processes user-supplied input without sufficient validation.
“Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to execute arbitrary code on the targeted system,” warned the cyber agency, advising the users to upgrade to the latest Zoho ‘ManageEngine ADAudit Plus’ security build update.
Last month, CERT-In issued an advisory over serious vulnerabilities in networking major Cisco products that could help hackers gain access, infiltrate into computer systems and steal data.
The multiple vulnerabilities have been reported in Cisco Secure Email and Web Manager, Cisco Email Security Appliance (ESA) and Cisco Enterprise Chat and Email (ECE) which could allow the attacker to execute arbitrary code, conduct a cross-site scripting (XSS) attack and retrieve sensitive information on the targeted system, CERT-In said in its advisory.
The ‘Information Disclosure Vulnerability’ exists in the web management interface of Cisco Secure Email and Web Manager, “due to a lack of proper input sanitisation while querying the external authentication server”.
“An attacker could exploit this vulnerability by sending a crafted query through an external authentication web page. Successful exploitation of this vulnerability could allow the attacker to gain access to sensitive information, including user credentials from the external authentication server,” the advisory read.
The ‘Cross Site Scripting Vulnerability’ exists in the web interface of Cisco Enterprise Chat and Email (ECE) “due to insufficient validation of user-supplied input that is processed by the web interface”.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information.