June 13, 2016 04:00 am
Original Link: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/IwHDlvMdWV4/severe-chrome-bug-allowed-arbitrary-code-execution
Severe Chrome Bug Allowed Arbitrary Code Execution
An anonymous reader quotes an article from Softpedia:Google has recently patched a high severity security bug in the Chrome browser that allowed crooks to send malicious code to your browser and take over your entire system... Cisco's Aleksandar Nikolic was the researcher that discovered and reported the issue to Google, who even awarded him $3,000 for his efforts. Chrome's built-in PDF reader PDFium used an OpenJPEG library to parse JPEG2000 files, and in Chrome it was lacking a crucial heap overflow check, according to a post on the Talos security blog. "By simply viewing a PDF document that includes an embedded jpeg2000 image, the attacker can achieve arbitrary code execution on the victim's system."Read more of this story at Slashdot.
Original Link: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/IwHDlvMdWV4/severe-chrome-bug-allowed-arbitrary-code-execution
Share this article:
Tweet
View Full Article
Slashdot
Slashdot was originally created in September of 1997 by Rob "CmdrTaco" Malda. Today it is owned by Geeknet, Inc..More About this Source Visit Slashdot