Security News

Zero day found in Google Chrome's FileReader API

Google identified a zero day vulnerability (CVE-2019-5786) on March 7 in the Google Chrome browser. A 'use-after-free' was discovered and quickly patched in the FileReader API, allowing an attack execute malicious code.

Google reports they have reason to believe an exploit exists in the wild and McAfee research has detailed the likely path to exploitation.

Google had earlier (March 1) released a software "update for all Chrome platforms", allowing users who have the browser's automatic updating service turned on to get the update. In order to protect against this exploit, Google aim to have all Chrome browsers at version 72.0.3626.121 or greater.

Not surprisingly, Google have taken this matter seriously and Justin Schuh, Engineering Director on Chrome, tweeted this: "Also, seriously, update your Chrome installs... like right this minute." (@justinschuh)

With Schuh's words ringing in our ears, Google Chrome users update your browser immediately!

Keep track of vulnerabilities in your stack

Receive a free weekly email with a round-up of all vulnerabilities that affect your software as well as relevant security news and articles. See an example email

Earlier: