Palo Alto Networks Firewall Vulnerability Exploited by RedTail Crypto-Mining Malware – Active IOCs
May 31, 2024BBC Data Breach Exposes Sensitive Information of Employees
May 31, 2024Palo Alto Networks Firewall Vulnerability Exploited by RedTail Crypto-Mining Malware – Active IOCs
May 31, 2024BBC Data Breach Exposes Sensitive Information of Employees
May 31, 2024Severity
High
Analysis Summary
CVE-2024-5493 CVSS:8.8
Google Chrome is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by WebRTC. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVE-2024-5494 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Dawn. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-5495 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Dawn. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-5496 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Media Session. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-5497 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds memory access in Keyboard Inputs. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-5498 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Presentation API. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-5499 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write in Streams API. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
Impact
- Gain Access
- Buffer Overflow
- Code Execution
Indicators of Compromise
CVE
- CVE-2024-5493
- CVE-2024-5494
- CVE-2024-5495
- CVE-2024-5496
- CVE-2024-5497
- CVE-2024-5498
- CVE-2024-5499
Affected Vendors
Affected Products
- Google Chrome 125.0
Remediation
Upgrade to the latest version of Google Chrome, available from the Google Chrome Releases Website.