CVE-2020-6398
📋 TL;DR
This vulnerability in Google Chrome's PDFium component allows attackers to exploit heap corruption by tricking users into opening malicious PDF files. Attackers could potentially execute arbitrary code or crash the browser. All Chrome users prior to version 80.0.3987.87 are affected.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
- Applications using PDFium library
📦 What is this software?
Backports Sle by Opensuse
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or ransomware deployment
Likely Case
Browser crash or denial of service, with potential for limited code execution in browser context
If Mitigated
No impact if Chrome is fully patched or PDF files are blocked
🎯 Exploit Status
Exploitation requires user interaction to open malicious PDF. No public exploit code was found in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 80.0.3987.87 and later
Vendor Advisory: https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome 2. Click menu (three dots) → Help → About Google Chrome 3. Chrome will automatically check for and install updates 4. Click 'Relaunch' to restart Chrome
🔧 Temporary Workarounds
Disable Chrome PDF viewer
allUse external PDF viewer instead of Chrome's built-in PDFium
chrome://settings/content/pdfDocuments → Toggle 'Download PDF files instead of automatically opening them in Chrome'
Block PDF downloads
allUse web proxy or firewall to block .pdf file downloads
🧯 If You Can't Patch
- Use alternative browsers without PDFium vulnerability
- Implement application whitelisting to block Chrome execution
🔍 How to Verify
Check if Vulnerable:
Check Chrome version: if below 80.0.3987.87, system is vulnerable
Check Version:
chrome://version/ (Windows/Linux/macOS) or Settings → About Chrome (mobile)
Verify Fix Applied:
Confirm Chrome version is 80.0.3987.87 or higher
📡 Detection & Monitoring
Log Indicators:
- Chrome crash logs with PDF-related stack traces
- Security event logs showing Chrome process termination
Network Indicators:
- Unusual PDF file downloads from untrusted sources
- Multiple Chrome crash reports from same user/system
SIEM Query:
source="chrome_logs" AND (event="crash" OR event="exception") AND process="chrome.exe" AND file_extension="pdf"
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
- https://access.redhat.com/errata/RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1032090
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4638
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
- https://access.redhat.com/errata/RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1032090
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4638