[CDP-development] TLP:GREEN - (Zero-day Alert Notification) - CVE-2024-4761: Out of bounds write in V8

CSS Security Operations Services * DAS css-soc-services at das.oregon.gov
Tue May 14 10:40:52 PDT 2024


Good morning,

The SOC Services team is reporting on the vulnerability: CVE-2024-4761: Out of bounds write in V8. Due to its high visibility and knowledge of the software installed in the state environment, we are providing this in-depth information:

History: On May 13, 2024, Google released a security advisory warning about an out-of-bounds write bug impacting the V8 JavaScript and WebAssembly engine.

The following version of Chrome addresses CVE-2024-4761; Google has released emergency fixes for this zero-day vulnerability. CVE-2024-4761 was issued after being anonymously reported on May 9, 2024, assigning a CVSSv3 rating of 8.1 (High).

Fixed version:

  *   Chrome version 124.0.6367.207/.208 (Windows, Mac) and Linux)
  *   Chrome version 124.0.6367.207 (Linux)

Intelligence: As of May 13, 2024, the vulnerability has been confirmed as being exploited in the wild. Details regarding the threat actors that have exploited this vulnerability are currently being withheld.

Workarounds: There are no workarounds at this time.

How it works: Out of bounds write" issue, which occurs when the program writes data outside the boundaries of pre-allocated memory. This type of vulnerability can lead to several severe consequences, including arbitrary code execution, data corruption, and system crashes. In the context of a web browser, it poses a significant risk as it could allow attackers to execute malicious code remotely, potentially compromising the user's system.

Post-Exploit: Upon successful exploitation of the vulnerability, this could be typically exploited by malicious actors to corrupt data, or induce a crash or execute arbitrary code on compromised hosts.

As of May 13, 2024, the following vulnerability plugin has been released and is currently in Tenable Security Center:
Plugin
Title
Severity
196907<https://www.tenable.com/plugins/nessus/196907>
Google Chrome < 124.0.6367.207 Vulnerability
High

Recommended Actions:


  *   Verify host has not been compromised before applying patches.
  *   Apply appropriate updates provided by vendor to vulnerable systems immediately after appropriate testing.
  *   Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  *   Apply the Principle of Least Privilege to all systems and services.


[cid:image001.png at 01DAA5D6.80867210]
Cyber Security Services
State of Oregon Cyber Security Services
Enterprise Information Services | SOC
Cyber Security Services (CSS)
SOC Hotline: (503) 378-5930 | SOC Services (503) 373-0378
"Ensuring user-friendly, reliable and secure state technology systems that serve Oregonians."


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20240514/0ce08bb5/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 21907 bytes
Desc: image001.png
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20240514/0ce08bb5/attachment-0001.png>


More information about the CDP-development mailing list