BROWSER-CHROME -- Snort has detected suspicious traffic known to exploit vulnerabilities present in the Chrome browser. These rules are separate from the "browser-webkit" category; while it uses the Webkit rendering engine, there's a lot of other features to create a secondary Chrome category.
BROWSER-CHROME Google Chrome Animation timeline use after free attempt
This rule looks for a malicious animation that attempts to cause a use-after-free in the renderer process of blink based renderers.
This fires from a malicious animation that could attempt to cause a use-after-free in Blink based renderers.
Attacks/Scans seen in the wild
No known false positives
Cisco Talos Intelligence Group
Tactic: Execution
Technique: Exploitation for Client Execution
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org
Memory Corruption
Memory Corruption is any vulnerability that allows the modification of the content of memory locations in a way not intended by the developer. Memory corruption results are inconsistent; they could lead to fatal errors and system crashes or data leakage; some have no effect at all.