Google Chrome Browser Cracked by Security Researchers
Vupen security researchers have discovered a way to crack Google's Chrome browser, but didn't reveal details.Security experts at Vupen Security, a specialist in vulnerability research for defensive and offensive security, claims they have successfully cracked Google's Chrome browser and its sandbox, denting Google's claims about how secure its browser is. A video on Vupen's Website shows the exploit in action with Google Chrome v11.0.696.65 on Microsoft Windows 7 SP1 (x64). The user is tricked into visiting a specially crafted Web page hosting the exploit, which will execute various payloads to ultimately download the Calculator from a remote location and launch it outside the sandbox (at Medium integrity level).
For security reasons, the exploit code and technical details of the underlying vulnerabilities will not be publicly disclosed, the Vupen security team said in a post on its Website, and noted they are exclusively shared with their government customers as part of their vulnerability research services. Vupen also disclosed the exploit works on both Chrome versions 11.x and 12.x. It was tested with Chrome v11.0.696.65 and v12.0.742.30.
Chrome uses technologies such as Safe Browsing, sandboxing and auto-updates to help protect users against phishing and malware attacks, and shows users a warning message before they visit a site that is suspected of containing malware or phishing. The sandbox adds an additional layer of protection to the browser by protecting against malicious Web pages that try to leave programs on a user's computer, monitor a user's Web activities or steal private information from the hard drive. In addition to analyzing and reversing freshly patched or publicly disclosed flaws, Vupen security engineers and researchers are also dedicated to finding new and unpatched security vulnerabilities in prominent and widely deployed software to help vendors eliminate security vulnerabilities in their products. Vupen's Website notes the organization follows a private responsible disclosure policy and reports all discovered vulnerabilities to the affected vendor under contract with Vupen, and works with them to create a timetable pursuant to which the vulnerability information may be publicly disclosed.