Google Chrome Polishes Its First Security Update
Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.
September 8, 2008
Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this advisory from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system.
From the advisory:
"Type of Issue : Buffer Overflow.
Affected Software : Google Chrome 0.2.149.27.
Exploitation Environment : Google Chrome on Windows XP SP2.
Impact: Remote code execution.
Rating : Critical.
Description : The vulnerability is caused due to a boundary error when handling the "SaveAs" function. On saving a malicious page with an overly long title (
How an attacker could exploit the issue : To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system.
"
Fortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting this Google page.
I've a suspicion we've many more Google Chrome security-related updates on the way.
Read more about:
2008About the Author
You May Also Like