CVE-2021-4055
📋 TL;DR
This vulnerability is a heap buffer overflow in Google Chrome extensions that allows an attacker to potentially exploit heap corruption. It affects users who install malicious extensions in Chrome versions prior to 96.0.4664.93, potentially leading to arbitrary code execution.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via arbitrary code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.
Likely Case
Malicious extension gains elevated privileges to steal sensitive data, install additional malware, or manipulate browser behavior.
If Mitigated
Limited impact if extensions are restricted to trusted sources only and Chrome is kept updated.
🎯 Exploit Status
Exploitation requires user interaction to install malicious extension; no public exploit code is known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 96.0.4664.93 and later
Vendor Advisory: https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome and click the three-dot menu. 2. Go to Help > About Google Chrome. 3. Chrome will automatically check for updates and install version 96.0.4664.93 or later. 4. Click 'Relaunch' to restart Chrome with the update.
🔧 Temporary Workarounds
Restrict Extension Installation
allConfigure Chrome to only allow extensions from the Chrome Web Store or disable extension installation entirely.
Navigate to chrome://extensions/, enable 'Developer mode', and restrict installation sources via Group Policy or registry settings.
Remove Suspicious Extensions
allReview and remove any extensions that are not from trusted sources or that you don't recognize.
Navigate to chrome://extensions/ and remove any suspicious extensions by clicking 'Remove'.
🧯 If You Can't Patch
- Implement strict extension whitelisting policies to only allow approved extensions from trusted sources.
- Use application control solutions to block execution of older Chrome versions and enforce browser security policies.
🔍 How to Verify
Check if Vulnerable:
Check Chrome version by navigating to chrome://version/ and verifying version is below 96.0.4664.93.
Check Version:
On Windows: "chrome://version/"; On Linux/macOS: open Chrome and go to chrome://version/
Verify Fix Applied:
Confirm Chrome version is 96.0.4664.93 or higher via chrome://version/.
📡 Detection & Monitoring
Log Indicators:
- Unusual extension installation events in Chrome logs
- Crash reports from Chrome with heap corruption signatures
Network Indicators:
- Downloads of Chrome extension files (.crx) from untrusted sources
- Connections to known malicious extension repositories
SIEM Query:
source="chrome_logs" AND (event="extension_install" AND source_url NOT CONTAINS "chrome.google.com/webstore")
🔗 References
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1266510
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://security.gentoo.org/glsa/202208-25
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1266510
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://security.gentoo.org/glsa/202208-25
- https://www.debian.org/security/2022/dsa-5046