CVE-2019-5759
📋 TL;DR
This vulnerability in Google Chrome allowed attackers to escape the browser's security sandbox via specially crafted HTML pages. It affected Chrome on Android and macOS versions before 72.0.3626.81, potentially enabling remote code execution on vulnerable systems.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via sandbox escape leading to arbitrary code execution with user privileges, potentially enabling further privilege escalation.
Likely Case
Remote attacker gains ability to execute code outside Chrome's sandbox, potentially accessing system resources and user data.
If Mitigated
With proper patching, no impact as the vulnerability is fully addressed in Chrome 72+.
🎯 Exploit Status
Exploitation requires crafting specific HTML with select elements to trigger use-after-free condition.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 72.0.3626.81 and later
Vendor Advisory: https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome 2. Click menu → Help → About Google Chrome 3. Allow update to complete 4. Restart Chrome when prompted
🔧 Temporary Workarounds
Disable JavaScript
allPrevents exploitation by disabling JavaScript execution in Chrome
Use alternative browser
allTemporarily switch to unaffected browser until Chrome is updated
🧯 If You Can't Patch
- Restrict access to untrusted websites using web filtering
- Implement application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in Settings → About Chrome. If version is below 72.0.3626.81, system is vulnerable.
Check Version:
chrome://version/ in Chrome address bar
Verify Fix Applied:
Confirm Chrome version is 72.0.3626.81 or higher in About Chrome page.
📡 Detection & Monitoring
Log Indicators:
- Chrome crash reports with memory access violations
- Unusual process creation from Chrome
Network Indicators:
- Requests to known exploit hosting domains
- Unusual outbound connections from Chrome
SIEM Query:
process_name:chrome.exe AND (event_id:1000 OR event_id:1001) AND description:*access*violation*
🔗 References
- http://www.securityfocus.com/bid/106767
- https://access.redhat.com/errata/RHSA-2019:0309
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://crbug.com/912211
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://www.debian.org/security/2019/dsa-4395
- http://www.securityfocus.com/bid/106767
- https://access.redhat.com/errata/RHSA-2019:0309
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://crbug.com/912211
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://www.debian.org/security/2019/dsa-4395