BROWSER-CHROME -- Snort has detected suspicious traffic known to exploit vulnerabilities present in the Chrome browser. These rules are separate from the "browser-webkit" category; while it uses the Webkit rendering engine, there's a lot of other features to create a secondary Chrome category.
This event is generated when an attacker attempts to exploit CVE-2017-5115.
Attempted User Privilege Gain
A vulnerability exists in the Chrome V8 TurboFan engine for Chrome < 61.0.3163.79 that could allow an attacker to corrupt an object in memory.
Ease of Attack:
What To Look For
This rule looks for attempts to exploit a memory corruption vulnerability in Google Chrome's V8 engine.
No public information
No known false positives
Cisco Talos Intelligence Group
MITRE ATT&CK Framework
Tactic: Initial Access
Technique: Drive-by Compromise
For reference, see the MITRE ATT&CK vulnerability types here:
CVE Additional Information
CVE-2017-5115Type confusion in V8 in Google Chrome prior to 61.0.3163.79 for Windows allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.
||Ease of Access||LOW