Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-5105 : What You Need to Know

Learn about CVE-2017-5105 affecting Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android. Find out how to prevent domain spoofing and phishing attacks.

Google Chrome prior to version 60.0.3112.78 for Mac, Windows, Linux, and Android had a vulnerability related to insufficient policy enforcement in the Omnibox, allowing remote attackers to perform domain spoofing.

Understanding CVE-2017-5105

Before version 60.0.3112.78, Google Chrome had a security issue in its Omnibox that could be exploited for domain spoofing.

What is CVE-2017-5105?

The vulnerability in Google Chrome allowed attackers to carry out domain spoofing by utilizing IDN homographs in a carefully crafted domain name.

The Impact of CVE-2017-5105

The vulnerability could be exploited by remote attackers to deceive users by displaying a malicious site as a legitimate one, potentially leading to phishing attacks.

Technical Details of CVE-2017-5105

Google Chrome's vulnerability details and affected systems.

Vulnerability Description

The issue stemmed from insufficient policy enforcement in the Omnibox of Google Chrome versions prior to 60.0.3112.78 for Mac, Windows, Linux, and Android.

Affected Systems and Versions

        Google Chrome versions prior to 60.0.3112.78 for Mac, Windows, Linux, and Android

Exploitation Mechanism

        Remote attackers could exploit the vulnerability by using IDN homographs in a carefully created domain name to carry out domain spoofing.

Mitigation and Prevention

Steps to mitigate and prevent the CVE-2017-5105 vulnerability.

Immediate Steps to Take

        Update Google Chrome to version 60.0.3112.78 or later to patch the vulnerability.
        Be cautious while visiting websites and avoid clicking on suspicious links.

Long-Term Security Practices

        Regularly update your web browser and other software to the latest versions.
        Educate users about the risks of domain spoofing and phishing attacks.

Patching and Updates

        Stay informed about security advisories and apply patches promptly to protect against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now