CVE-2024-4059
📋 TL;DR
This vulnerability is an out-of-bounds read in Chrome's V8 JavaScript engine that allows a remote attacker to leak cross-site data via a crafted HTML page. It affects Google Chrome users running versions prior to 124.0.6367.78. Attackers can exploit this to bypass same-origin policy protections and access sensitive information from other websites.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of user session data across multiple websites, including authentication tokens, personal information, and financial data, potentially leading to account takeover and identity theft.
Likely Case
Targeted data exfiltration from specific websites visited by the user, such as stealing login credentials, session cookies, or sensitive form data from banking or email sites.
If Mitigated
No data leakage if Chrome is fully patched or if vulnerable versions are isolated from untrusted web content.
🎯 Exploit Status
Exploitation requires user interaction (visiting a malicious webpage) but no authentication. The vulnerability is in the V8 engine which is complex to exploit reliably.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 124.0.6367.78
Vendor Advisory: https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html
Restart Required: Yes
Instructions:
1. Open Chrome. 2. Click the three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the patched version.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents exploitation by disabling JavaScript execution, but breaks most website functionality.
Use Site Isolation
allEnhances Chrome's site isolation feature to limit cross-site data leakage.
Navigate to chrome://flags/#site-isolation-trial-opt-out and set to 'Disabled'
🧯 If You Can't Patch
- Deploy network filtering to block known malicious domains hosting exploit code.
- Implement application allowlisting to restrict browser usage to trusted applications only.
🔍 How to Verify
Check if Vulnerable:
Check Chrome version: Open Chrome → Click three-dot menu → Help → About Google Chrome. If version is below 124.0.6367.78, you are vulnerable.
Check Version:
On Windows: "C:\Program Files\Google\Chrome\Application\chrome.exe" --version
On macOS: /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version
On Linux: google-chrome --version
Verify Fix Applied:
Confirm Chrome version is 124.0.6367.78 or higher using the same About page.
📡 Detection & Monitoring
Log Indicators:
- Unusual Chrome crash reports with V8-related errors
- Multiple out-of-bounds memory access warnings in system logs
Network Indicators:
- HTTP requests to suspicious domains immediately followed by data exfiltration patterns
- Unusual cross-origin resource sharing (CORS) patterns
SIEM Query:
source="chrome_logs" AND (error="V8" OR error="out of bounds") OR process="chrome" AND event="crash"
🔗 References
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html
- https://issues.chromium.org/issues/333182464
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html
- https://issues.chromium.org/issues/333182464
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/