You are currently viewing Chrome Zero-Day Under Active Exploitation – Patch Now

Chrome Zero-Day Under Active Exploitation – Patch Now

We all know the popularity and intensively large audience of the Google Chrome browser which can be used on Windows, Mac, or Linux computers and Android devices. To the ones who are currently using the same and have not yet deployed the patch, it’s time to update their Chrome browsers to the latest version 86.0.4240.111 Google released. In the latest version, Google has addressed a serious 0-day heap buffer overflow vulnerability along with 3 high-risk vulnerabilities and 1 medium-risk vulnerability.

Zero-Day CVE-2020-15999 :

This actively exploited memory corruption flaw which results in heap buffer overflow resides in Freetype open source development library used for rendering fonts that comes packed with Chrome. The vulnerability was reported by security researcher Sergei Glazunov of Google Project Zero on October 19. The security researcher then immediately reported the 0-day vulnerability to Freetype developers who seemed to have addressed the issue in Freetype on October 20 with the release of FreeType 2.10.4.

According to the details shared by the reporter, the heap buffer overflow vulnerability exists in the FreeType’s function “Load_SBit_Png” that processes PNG images embedded into fonts. This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images.

Glazunov explained,

The issue is that libpng uses the original 32-bit values, which are saved in `png_struct`. Therefore, if the original width and/or height are greater than 65535, the allocated buffer won’t be able to fit the bitmap.

The technical lead for Google’s Project Zero Ben Hawkes informed that while they have only spotted the exploits targeting Chrome users, it’s is also possible that other projects using Freetype might also be vulnerable and advised to deploy the patch with FreeType version 2.10.4.

Since the patch for the vulnerability is visible in the source code of FreeType open-source library. Attackers might be able to reverse-engineer the code and develop working exploits for this vulnerability.

Affected products

Google Chrome versions before 86.0.4240.111 and FreeType open-source library versions before 2.10.4.


This issue allows attackers to execute arbitrary code on the affected system.


Google has released the security updates addressing the issue in Google Chrome version 86.0.4240.111.

SanerNow detects this vulnerability and automatically fixes it by applying security updates. Download SanerNow and keep your systems updated and secure.