Vupen Security Pawns Google Chrome
Article by George Norman
On 12 May 2011
Google Chrome web browser has made a name for itself by being one of, if not the fastest browser on the market today. The browser also made a name for itself by offering a properly good level of security; what I mean by that is that for the past three years it survived the Pwn2Own contest, computer hacking contest held at the annual CanSecWest security conference, beginning in 2007 and sponsored by TippingPoint.

Chrome’s restrictive sandbox and other security measures meant that Pwn2own contestants could not pwn the browser. They could pwn other browsers, like Microsoft’s Internet Explorer, Apple’s Safari or Mozilla’s Firefox, but not Google’s Chrome.

Sponsored Links

The news is that Chrome’s reputation of being unpwnable has been broken by Vupen Security, world leader in vulnerability research for defensive and offensive security. Vupen announced that it pwned Chrome, that it came up with a sophisticated exploit, the most sophisticated one Vupen has ever come up with, exploit that bypasses Chrome’s sandbox and other security features, including DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization).

Vupen explained that the exploit it came up with does not exploit a Windows kernel vulnerability; it exploits an undisclosed 0-day vulnerability discovered by Vupen, vulnerability that works on all 32-bit and 64-bit Windows systems. The exploit is silent, there’s no crash after executing the payload; it works on Chrome 11.X and 12.X.

“We are (un)happy to announce that we have officially Pwned Google Chrome and its sandbox,” said Vupen. “While Chrome has one of the most secure sandboxes and has always survived the Pwn2Own contest during the last three years, we have now uncovered a reliable way to execute arbitrary code on any default installation of Chrome despite its sandbox, ASLR and DEP.”

A video that presents the Vupen-uncovered exploit in action is available on YouTube here.
In the video a user of Chrome 11.0.696.65 on Windows 7 SP1 is tricked into visiting a malicious website that hosts Vupen’s exploit. The exploit code downloads a Calculator program from a remote location and launches it outside Chrome’s sandbox.



Tags: Google, Chrome, Security
About the author: George Norman
George is a news editor.
You can follow him on Google+, Facebook or Twitter

I Hope you LIKE this blog post! Thank you!
What do YOU have to say about this
blog comments powered by Disqus
Popular News
By George Norman on 28 Jun 2016
When you’re out and about, with no way of accessing a power outlet, every minute of battery life you squeeze out of your device matters. So here are 7 tips on how you can do just that.
By George Norman on 27 Jun 2016
Dealing with ransomware is like dealing with a kidnapper. Once your data is taken hostage, you’re asked to pay a ransom to get it back. It’s a scary experience, as this NASCAR racing team uncovered.
Related News
By George Norman on 21 Apr 2016
Chrome reaching version 50 is a pretty big milestone for the browser, one that that should be celebrated. Google decided to do that by presenting some amazing stats about its web browser.
By George Norman on 01 Apr 2016
Throughout the year, Google is all serious and focused. But on April Fools' Day, the search engine giant lets its hair down and has a bit of fun. It’s done so for the past few years and it’s doing it again this year.
By George Norman on 15 Jun 2016
You search for things online using Google’s search engine, you send and receive emails via Google’s Gmail, you browse the web with Google’s Chrome browser, you carry a phone in your pocket that’s...
By George Norman on 05 Jan 2016
Shutterstock Tab turns Chrome's new tab page into a thing of beauty that features inspiring images, info about the time & date, and even the weather forecast for your location.
Sponsored Links
Hot Software Updates
Top Downloads
Become A Fan!
Link To Us!
Vupen Security Pawns Google Chrome
HTML Linking Code