CVE-2019-13728
📋 TL;DR
This vulnerability is an out-of-bounds write in Chrome's JavaScript engine that allows remote attackers to potentially exploit heap corruption via a crafted HTML page. Attackers could execute arbitrary code or cause denial of service. All users of affected Chrome versions are at risk when visiting malicious websites.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Enterprise Linux For Scientific Computing by Redhat
View all CVEs affecting Enterprise Linux For Scientific Computing →
Enterprise Linux For Scientific Computing by Redhat
View all CVEs affecting Enterprise Linux For Scientific Computing →
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or ransomware deployment
Likely Case
Browser crash/denial of service or limited code execution in sandboxed browser context
If Mitigated
No impact if Chrome is fully patched or if exploit attempts are blocked by security controls
🎯 Exploit Status
Exploit requires JavaScript execution but no user interaction beyond visiting a malicious page. Bug report includes technical details that could aid exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 79.0.3945.79 and later
Vendor Advisory: https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome menu > Help > About Google Chrome. 2. Chrome will automatically check for and apply update. 3. Click 'Relaunch' when prompted. 4. Verify version is 79.0.3945.79 or higher.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents exploitation by blocking JavaScript execution
Use Chrome sandboxing
allEnsure Chrome sandbox is enabled to limit impact
chrome://flags/#enable-site-per-process (ensure enabled)
🧯 If You Can't Patch
- Use alternative browser until patching possible
- Implement web filtering to block known malicious sites
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in menu > Help > About Google Chrome
Check Version:
google-chrome --version (Linux) or chrome://version (all platforms)
Verify Fix Applied:
Confirm version is 79.0.3945.79 or higher in About Google Chrome
📡 Detection & Monitoring
Log Indicators:
- Chrome crash reports
- Unexpected browser termination
- Security event logs showing exploit patterns
Network Indicators:
- Requests to known exploit domains
- Unusual JavaScript execution patterns
SIEM Query:
source="chrome" AND (event_type="crash" OR message="*out_of_bounds*" OR message="*heap_corruption*")
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:4238
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1024758
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://seclists.org/bugtraq/2020/Jan/27
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4606
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:4238
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1024758
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://seclists.org/bugtraq/2020/Jan/27
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4606