BROWSER-CHROME -- Snort has detected suspicious traffic known to exploit vulnerabilities present in the Chrome browser. These rules are separate from the "browser-webkit" category; while it uses the Webkit rendering engine, there's a lot of other features to create a secondary Chrome category.
BROWSER-CHROME Google Chrome V8 JavaScript Engine memory corruption attempt
This event is generated when an attacker attempts to exploit CVE-2017-5115. Impact: Attempted User Privilege Gain Details: A vulnerability exists in the Chrome V8 TurboFan engine for Chrome < 61.0.3163.79 that could allow an attacker to corrupt an object in memory. Ease of Attack:
This rule looks for attempts to exploit a memory corruption vulnerability in Google Chrome's V8 engine.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
N/A
Not Applicable
CVE-2017-5115 |
Loading description
|
Tactic: Initial Access
Technique: Drive-by Compromise
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org