Note: this issue was fixed in Google Chrome 105.0.5195.62. Users can upgrade to the latest version which fixes this issue. WebExtension users should upgrade to version 1.1.7 which has been released with this fix. CVE-2018-4878 An issue was discovered on Google Chrome OS prior to version 105.0.5 prior to the Pango font rendering library version 3.30.x, 3.37.x, 3.38.x, 3.39.x, 3.40.x, or 3.41.x, which allows remote attackers to cause a denial of service (out-of-memory error) via a crafted HTML page.

CVE-2018-4876 An issue was discovered on Google Chrome OS prior to version 105.0.5 prior to the libvirt XML API library version 1.1.16, which allows attackers to bypass security protections via a crafted HTML page.

CVE-2018-4874 An issue was discovered on Google Chrome OS prior to version 105.0.5 prior to the Linux kernel version 4.15.x, 4.9.x, 4.4.x, or 4.11.x, which allows attackers to bypass security protections via a crafted HTML page.

CVE-2018-4876 An issue was discovered on Google Chrome OS prior to version 105.0.5 prior to the libvirt XML API library version 1.1.

Security principles for Enterprise Networking Devices

Enterprise Networking Devices that are deployed in large enterprises must be secure. Security concerns can be divided into two categories: data and network.
Data security refers to verifying the integrity of the data itself. This includes protecting data from tampering, encrypting data, and making sure that it has not been tampered with in any way.
Network security covers securing the network, including protecting against unauthorized access from a device or a third-party attacker, authorizing access only to authorized devices or users through authentication, and using encryption for all network communications.

Security concerns and hardening

There are a number of security concerns that can be hardening your website against.
So, what should you do? You have to make sure you're following industry best practices and following the Google Chrome Security Checklist.
First, make sure your software hasn't been compromised by malware or other malicious code. To do this, run a scanner through your site as part of an assessment. Next, make sure you adopt at least one SSL certificate for your site. This will encrypt any data that comes through the site so that attackers can't intercept it.  Then, you'll want to check the permissions on files and directories in your domain's web root directory. Make sure these don't allow read-only access or allow anonymous access (which is only for local connections).  Users can access your computer remotely via HTTP ports 80 and 443 so those ports should be restricted as well.

Timeline

Published on: 09/26/2022 16:15:00 UTC
Last modified on: 09/27/2022 03:37:00 UTC

References