Patch Gap in Chrome Could Have Been Weaponized by Attackers

Patch Gap in Chrome Could Have Been Weaponized by Attackers

1 Star2 Stars3 Stars4 Stars5 Stars (2 stemmer, gennemsnit: 5.00 ud af 5)
Loading ...

Patch gapping is a serious issue that puts a system at risk of exploits. The problem stems from a gap in time before a patch of a security vulnerability in an open-source software is shipped to users.

The vulnerability may have been fixed already, or in the process of being fixed, and attackers can exploit the time before the patch arrives on users’ devices. This window, in which the knowledge of the vulnerability is semi-public while the user-base remains vulnerable, can range from days to months, explains security researcher István Kurucsai.

The Patch Gap in Google Chrome Explained

The researcher just discovered an instance of this issue in Google Chrome. The flaw could have been exploited in attacks against Chrome users days before the patch arrived.

It should be noted that not all patch gaps can be weaponized in attacks, and they are not that common. Ikke desto mindre, Kurucsai discovered one in Google Chrome’s v8 open-source component which is used as the browser’s JavaScript engine.

An interesting change list on chromium-review piqued our interest in mid-August. It was for an issue affecting sealed and frozen objects, including a regression test that triggered a segmentation fault. It has been abandoned (and deleted) since then in favor of a different patch approach, with work continuing under CL 1760976, which is a much more involved change, the researcher wrote in et blogindlæg.

Kort sagt, the patch gap is due to the V8 issue which was patched in August. “Since the fix turned out to be so complex, the temporary solution for the 7.7 v8 branch was to disable the affected functionality. This will only be rolled into a stable release on the 10th of September,” forskeren forklarede. Med andre ord, the issue should now be closed with the release of Chrome 77.

Relaterede: Researchers Disclose Unpatched Android Zero-Day

According to the researcher and his team, attackers had plenty of time to weaponize this issue through the v8 changelog for security fixes. Even though the conception of a Chrome exploit is not an easy task, an attacker who is an expert in JavaScript could have done it. To prove his point, Kurucsai also released a PoC (proof-of-concept) on GitHUb. The PoC leverages the initial v8 problem to run malicious code in Chrome.

It should be noted that the PoC is not efficient enough as a second vulnerability to escape the Chrome sandbox is needed. Men, attackers still could have utilized older Chrome sandbox escape flaws to leverage them with the patch gap issue.

Sidste år, researchers Karsten Nohl and Jakob Lell from security firm Security Research Labs uncovered a hidden patch gap in Android devices. De to gennemførte en toårig analyse af 1,200 Android phones only to discover that most Android vendors regularly forget to include some patches, forlader dele af økosystemet udsat for forskellige trusler.


Milena Dimitrova

En inspireret forfatter og indhold leder, der har været med SensorsTechForum for 4 år. Nyder ’Mr. Robot’og frygt’1984’. Fokuseret på brugernes privatliv og malware udvikling, hun tror stærkt på en verden, hvor cybersikkerhed spiller en central rolle. Hvis almindelig sund fornuft giver ingen mening, hun vil være der til at tage noter. Disse noter senere kan blive til artikler!

Flere indlæg

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Frist er opbrugt. Venligst genindlæse CAPTCHA.

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...