Rewterz Threat Alert – Ryuk Ransomware – Active IOCs
September 19, 2022Rewterz Threat Advisory – CVE-2022-37969 – Microsoft Windows Common Log File System Driver Vulnerability
September 19, 2022Rewterz Threat Alert – Ryuk Ransomware – Active IOCs
September 19, 2022Rewterz Threat Advisory – CVE-2022-37969 – Microsoft Windows Common Log File System Driver Vulnerability
September 19, 2022Severity
High
Analysis Summary
CVE-2022-3195 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write in Storage. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
CVE-2022-3197 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in PDF. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
CVE-2022-3198 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in PDF. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
CVE-2022-3199 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Frames. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
CVE-2022-3200 CVSS:8.8
Google Chrome is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by Internals. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVE-2022-3201 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient validation of untrusted input in DevTools. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Impact
- Code Execution
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2022-20846
- CVE-2022-20849
Affected Vendors
Affected Products
- Google Chrome 105.0
Remediation
Upgrade to the latest version of Chrome available from the Google Chrome Releases Website.
Google Chrome Releases Website