Comprehensive software reviews to make better IT decisions
“Unsafe” Code Uncovered in Chrome Browser (and Chromium-Based Browsers)
Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all Chromium-based web browsers.
Engineers identified an issue in its Chrome web browser that may permit poorly written code to allow access to data stored in active (RAM) memory. This was first published on Google’s Chromium Project website.
Google explains that the issue is inherent in the programming languages C and C++, of which neither “…come[s] with restrictions or warnings to prevent or alert developers when they're making basic memory management errors. These early coding errors result in memory management vulnerabilities being introduced in applications.” (“Google Just Gave Millions Of Users A Reason To Quit Chrome.” Forbes. 29 May 2020.)
This implicates that both C and C++ provide programmers with a means of allocating RAM memory to carry out functions. Once the memory is no longer needed, the program can release the memory back to the operating system. However, the release of the memory addresses does not purge the content of that memory, making the content available for malicious programs to access. The previous paragraph explains that neither C nor C++ have mechanisms to warn programmers of these types of memory management errors. Most programs have a “garbage collection” function that cleans up memory after use.
Google explains that over 70% of its high-severity security bugs are attributed to this fault, represented by “other memory unsafety” and “use after free” in the chart below:
(Source: “Memory safety.” The Chromium Projects. Web. 29 May 2020.)
This identified flaw affects all Chromium-based browsers, including Opera, Brave, and Microsoft Edge. As Samsung Internet on the Android mobile operating system is Chromium-based, it is possible that it may also be affected by this bug.
As a short-term solution, Chrome version 84 will be released on July 14, 2020, which attempts to mitigate the risk by controlling abusive permission requests and browser notifications from malicious websites that attempt to exploit the memory bug. Administrators should ensure that all Chrome and Chromium-based browsers are upgraded to version 84 as soon as it is generally available.
For a longer-term solution, Google is examining alternatives to C/C++, including Rust, a programming language that is similar in syntax to C++, but has built-in memory safety features. Microsoft has already been replacing the C++ code in its Chromium-based Edge browser with Rust, having identified the limitations of C and C++.
Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack surface management (EASM) was a popular managed service and topic of discussion at Rivest–Shamir–Adleman (RSA) Conference 2023, named after a popular public-key cryptosystem.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers. Trust and peace of mind are the core tenets of what they are selling and solutions like Acronis Cyber Protect Cloud can provide the platform upon which to deliver on those promises.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.