<p>Researchers disclosed a remote code execution vulnerability in SQLite affecting Google Chromium-based browsers as well as the Google Home smart speaker.</p>
<p>On December 14, researchers from Tencent’s Blade Team published <a href="https://blade.tencent.com/magellan/index_en.html">an advisory regarding their discovery of “Magellan,”</a> a remote code execution vulnerability in SQLite. </p>
<h2>Vulnerability details</h2>
<p>Details surrounding the Magellan vulnerability remain sparse at this time. However, the Blade Team specifies that the impact of this vulnerability includes code execution, memory leak or denial of service (DoS). Additionally, Chromium, Google’s open source codebase that powers Google Chrome, is affected by this vulnerability. There are several other browser implementations that utilize the Chromium codebase, including <a href="https://brave.com/">Brave</a>, <a href="https://www.opera.com/">Opera</a>, <a href="https://vivaldi.com/">Vivaldi</a> and <a href="https://browser.yandex.com/">Yandex</a>.</p>
<p>According to the Blade Team, they were able to use the Magellan vulnerability to exploit the <a href="https://store.google.com/us/product/google_home?">Google Home</a> smart speaker, but have stated they have no plans to release any proof-of-concept (PoC) code for Magellan. However, several hours after the Blade Team released their advisory, an app developer published a PoC that crashes Chrome 70.</p>
<h2>Urgently required actions</h2>
<p>Tenable strongly advises organizations and individuals to upgrade to patched versions as soon as possible.</p>
<p>SQLite released <a href="https://sqlite.org/releaselog/3_26_0.html">version 3.26.0</a> on December 1, 2018, while Google released <a href="https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-... 71.0.3578.80</a> on December 4, 2018. Google Chrome version 71 contains the patches provided in Chromium 71.0.3578.80. Additionally, Linux distributions such as <a href="https://access.redhat.com/errata/RHSA-2018:3803">Red Hat Enterprise Linux</a>, <a href="https://www.debian.org/security/2018/dsa-4352">Debian</a> and <a href="https://lwn.net/Articles/774463/">openSUSE</a> have released security advisories that include the Chromium patch. </p>
<h2>Identifying affected systems</h2>
<p>A list of Nessus plugins to identify this vulnerability can be found <a href="https://www.tenable.com/plugins/search?q=%2271.0.3578.80%22&sort=&page=1...
<h2>Get more information</h2>
<ul><li><a href="https://blade.tencent.com/magellan/index_en.html">Tencent Blade Team: Magellan</a></li>
<li><a href="https://sqlite.org/releaselog/3_26_0.html">SQLite Release 3.26.0 On 2018-12-01</a></li>
<li><a href="https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-... Releases: Stable Channel Update for Desktop</a></li>
<li><a href="https://access.redhat.com/errata/RHSA-2018:3803">RHSA-2018:3803 - Security Advisory</a></li>
<li><a href="https://www.debian.org/security/2018/dsa-4352">Debian Security Advisory DSA-4352-1</a></li>
<li><a href="https://lwn.net/Articles/774463/">openSUSE alert SU-2018:4056-1</a></li></ul>
<p><b><i>Learn more about <a href="https://www.tenable.com/products">Tenable</a>, the first Cyber Exposure platform for holistic management of your modern attack surface. Get a <a href="https://www.tenable.com/products/tenable-io/vulnerability-management/eva... 60-day trial</a> of Tenable.io Vulnerability Management. </i></b></p>