[CDP-development] TLP:GREEN - (Zero-day Alert Notification) - CVE-2023-6345: Google Chrome Integer overflow in Skia.

CSS Security Operations Services * DAS css-soc-services at das.oregon.gov
Wed Nov 29 09:59:37 PST 2023


Good morning,

The SOC Services team is reporting on the vulnerability: CVE-2023-6345: Google Chrome Integer overflow in Skia. Due to its high visibility and knowledge of the software installed in the state environment, we are providing this in-depth information:

History: On November 28, 2023, Google released a security advisory warning about a Google Chrome integer overflow zero-day (CVE-2023-6345) in Skia.

The following versions of Chrome address CVE-2023-6345 but Google states the updates "will roll out over the coming days/weeks". However, the updates are currently available through manual updates.

Fixed versions:

  *   Chrome version 119.0.6045.119/.200 (Windows)
  *   Chrome version 119.0.6045.119 (Mac and Linux)

Intelligence: As of November 29, 2023, the vulnerability has been confirmed as being exploited in the wild.

Workarounds: There are no workarounds at this time.

How it works: The details of the exploit are being withheld by the security researchers until the majority of users have applied the updates. The researchers have also stated they will retain restrictions if the bug exists in a third party library that haven't been fixed yet.

Post-Exploit: Upon successful exploitation of the vulnerability, a threat actor could possibly cause crashes or execute arbitrary code.

As of November 28, 2023, the following vulnerability plugins have been released and are currently in Tenable Security Center:
Plugin
Title
Severity
186363<https://www.tenable.com/plugins/nessus/186363>
Google Chrome < 119.0.6045.199 Multiple Vulnerabilities
Critical
186362<https://www.tenable.com/plugins/nessus/186362>
Google Chrome < 119.0.6045.199 Multiple Vulnerabilities
Critical

Recommended Actions:


  *   Verify host has not been compromised before applying patches.
  *   Apply appropriate updates provided by vendor to vulnerable systems immediately after appropriate testing.
  *   Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  *   Apply the Principle of Least Privilege to all systems and services.


[cid:image001.png at 01DA22A1.93A6C470]
Cyber Security Services
State of Oregon Cyber Security Services
Enterprise Information Services | SOC
Cyber Security Services (CSS)
SOC Hotline: (503) 378-5930 | SOC Services (503) 373-0378
"Ensuring user-friendly, reliable and secure state technology systems that serve Oregonians."


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20231129/7d77177b/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 21907 bytes
Desc: image001.png
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20231129/7d77177b/attachment-0001.png>


More information about the CDP-development mailing list