BROWSER-CHROME -- Snort has detected suspicious traffic known to exploit vulnerabilities present in the Chrome browser. These rules are separate from the "browser-webkit" category; while it uses the Webkit rendering engine, there's a lot of other features to create a secondary Chrome category.
BROWSER-CHROME Google Chrome V8 engine object instantiation heap corruption attempt
This event is generated when an attacker attempts to exploit a memory corruption vulnerability in Google Chrome.
Attempted User Privilege Gain
This rule checks for attempts to exploit a heap memory corruption vulnerability in Google Chrome's V8 engine.
Ease of Attack:
What To Look For
No public information
No known false positives
Cisco Talos Intelligence Group
MITRE ATT&CK Framework
For reference, see the MITRE ATT&CK vulnerability types here:
CVE Additional Information
||Ease of Access||LOW