CVE-2019-13736
📋 TL;DR
This CVE describes an integer overflow vulnerability in PDFium, Chrome's PDF rendering engine, that could allow heap corruption when processing malicious PDF files. Attackers could potentially execute arbitrary code or crash the browser. All Chrome users prior to version 79.0.3945.79 are affected.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
- Applications using PDFium library
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Enterprise Linux For Scientific Computing by Redhat
View all CVEs affecting Enterprise Linux For Scientific Computing →
Enterprise Linux For Scientific Computing by Redhat
View all CVEs affecting Enterprise Linux For Scientific Computing →
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or malware installation.
Likely Case
Browser crash (denial of service) or limited code execution in sandboxed context.
If Mitigated
No impact if Chrome is fully patched or PDF rendering is disabled.
🎯 Exploit Status
Exploitation requires user interaction (opening PDF) but no authentication. Heap corruption exploitation requires additional techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 79.0.3945.79 and later
Vendor Advisory: https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome settings > Help > About Google Chrome. 2. Chrome will automatically check for and install updates. 3. Click 'Relaunch' to restart Chrome with the patched version.
🔧 Temporary Workarounds
Disable Chrome PDF Viewer
allUse external PDF reader instead of built-in Chrome PDFium
chrome://settings/content/pdfDocuments
Toggle 'Download PDF files instead of automatically opening them in Chrome'
Block PDF downloads
allUse web proxy or firewall to block .pdf file downloads
🧯 If You Can't Patch
- Use alternative browsers without PDFium for PDF viewing
- Implement application whitelisting to block Chrome execution
🔍 How to Verify
Check if Vulnerable:
Check Chrome version: if version is less than 79.0.3945.79, system is vulnerable.
Check Version:
chrome://version/ or 'google-chrome --version' (Linux) or check About Chrome in settings
Verify Fix Applied:
Verify Chrome version is 79.0.3945.79 or higher.
📡 Detection & Monitoring
Log Indicators:
- Chrome crash reports
- Unexpected process termination
- Security event logs showing PDF file access
Network Indicators:
- PDF file downloads from untrusted sources
- Unusual outbound connections after PDF opening
SIEM Query:
source="chrome" AND (event="crash" OR event="process_termination") AND file_extension="pdf"
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:4238
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1020899
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://seclists.org/bugtraq/2020/Jan/27
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4606
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:4238
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1020899
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://seclists.org/bugtraq/2020/Jan/27
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4606