Skip Ribbon Commands
Skip to main content
Computer Emergency Response Team of Mauritius (CERT-MU)
Computer Emergency Response Team of Mauritius>Google Patches High Severity Browser PDF Vulnerability

Google Patches High Severity Browser PDF Vulnerability


A critical vulnerability known as “The PDFium exploit” (CVE-2016-1681) found in Google Chrome browser has been patched. PDFium is the default PDF reader that is included in the Google Chrome web browser. A heap buffer overflow vulnerability has been detected in the Pdfium PDF reader. By simply viewing a PDF document that includes an embedded jpeg2000 image, the attacker can carry out arbitrary code execution on the victim’s system. The most effective attack vector is for the threat actor to place a malicious PDF file on a website and and then redirect victims to the website using either phishing emails or even malvertising. The heap buffer overflow vulnerability is present in the jpeg2000 image parser library as used by the Chrome’s PDF renderer, PDFium. The vulnerability is located in the underlying jpeg2000 parsing library, OpenJPEG, but is made exploitable in case of Chrome due to special build process.
Source:
Threatpost
 
Cisco Blog
 
Team Cymru
 
Contact Information
Postal address
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street
Port Louis