Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.
The Google Chrome web browser contains a vulnerability that could be exploited by an adversary to gain the ability to execute code on the victim machine. Chrome is one of the most popular web browsers currently available to users. Cisco Talos researchers recently discovered a bug in WebGL, which is a Chrome API responsible for displaying 3-D graphics.
In accordance with our coordinated disclosure policy, Cisco Talos worked with Google to ensure that these issues are resolved and that an update is available for affected customers.
Google Chrome WebGL Buffer11::getBufferStorage code execution vulnerability (TALOS-2020-1127/CVE-2020-6555)
Read the complete vulnerability advisory here for additional information.
Talos tested and confirmed that Google Chrome, version 83.0.4103.61 and the developer build of Chrome version 85.0.4169.0 (64-bit) is affected by this vulnerability.
The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.
Snort Rules: 54638, 54639