Google Chrome – which covers about 60% of browser population in Internet – has respectable security designs and appropriate user controls for balanced user privacy and security. Of all, most notable is a sandbox feature, which is based on Google’s second design principle: “non-malicious code does not try to access resources it cannot obtain” (Chromium). Essentially, as sandbox itself shouldn’t require superuser privilege, consequently, there is no need for its’ contained processes to inherit the prerogative of administrator. At the time of writing, Google Chrome version indicates: version 37.0.2062.102m. This update covers about 50 security flaws – found in Google bug bounty program and independent security experts/researchers – ranging from out-of-sandbox (“escaped,” more specifically) remote code executions to minor bugs. These three are my favorites and their applicable descriptions in our life respectively:
1. [CVE-2014-3176, CVE-2014-3177]
2. [CVE-2014-3170]
This vulnerability marks “extension permission dialog spoofing.” When you install an extension, remember how you get those prompts such as ‘access your data on www.google.com’ or ‘access your tabs and browsing activity?’ Before Chrome 37.x.x.x, an extension permissions were spoofed to show minimal, different, or none. While browsing, for example, a seemingly innocuous extension could be extracting browsing habit data.

3. [CVE-2014-3173]
This is uninitialized memory read in WebGL. WebGL is a JS-based rendering of 3D and 2D graphics in a browser. Using Java, for example, to initialize an object, you would specify two things: object type and the “container.” Now, why is uninitialized memory read illegal to a program? Well, that’s because several things can happen: memory corruption, really hard tracing of the corruption, unwanted collection by garbage collector, etc. A similar case study can be seen with Heartbleed and OpenSSL. Essentially, improper input validation would cause extra spaces of memories to be read/collected and reversed to reveal sensitive information loaded onto a memory.
As with number of patches seen in Google Chrome, each seems to indicate that there are numerous problems which exists in any computer software: there cannot be 100% immunity to newer technologies and exploitation techniques. Perhaps, that is the technologies' greatest gift and a curse.
(*) Chromium – The Chromium Projects (Sandbox)
No comments:
Post a Comment