![]() ![]() Additionally, Apple recently patched three zero-days that were used to exploit an Egyptian presidential candidate’s phone with the Predator spyware developed by Cytrox, another commercial spyware vendor. This vulnerability affected popular apps such as 1Password, Firefox, Microsoft Edge, Safari, and Signal. This emergency patch for Google Chrome comes shortly after Google fixed another zero-day vulnerability, which was initially misidentified as a Chrome vulnerability but was later assigned to the open-source libwebp library. The patch is currently being rolled out to Windows, Mac, and Linux users in the Stable Desktop channel. The vulnerability has been fixed in the latest version of Google Chrome, version 1.132. The company stated that access to bug details and links would be restricted until a majority of users had updated with the fix. If the version returns an empty Branch Base Position try increment the last component of the version until you get a Branch Base Version. ![]() To do that enter the Full Version Number and press lookup. The specific details of the attacks exploiting the vulnerability were not disclosed in Google’s advisory. Use the 'Version Information' tool to find a Branch Base Position for the Full Version number. The zero-day vulnerability, described as a “heap buffer overflow in vp8 encoding in libvpx,” allowed the spyware vendor to install malicious software on victims’ systems. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |