BROWSER-CHROME -- Snort has detected suspicious traffic known to exploit vulnerabilities present in the Chrome browser. These rules are separate from the "browser-webkit" category; while it uses the Webkit rendering engine, there's a lot of other features to create a secondary Chrome category.
BROWSER-CHROME Google Chrome V8 Engine JSStackCheck memory corruption attempt
This rule looks for a specific pattern of JavaScript object and function call that would indicate an attempt to type confusion exploit is being attempted.
This rule alerts when Snort detects an attempt to exploit a JavaScript type confusion vulnerability in Google Chrome.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
MITRE::ATT&CK Framework::Enterprise::Initial Access::Drive-by Compromise
Rule Categories::Browser::Chrome
Memory Corruption
Memory Corruption is any vulnerability that allows the modification of the content of memory locations in a way not intended by the developer. Memory corruption results are inconsistent; they could lead to fatal errors and system crashes or data leakage; some have no effect at all.
CVE-2023-3420 |
Loading description
|