Otkriven sigurnosni propust u Chrome-u

poruka: 2
|
čitano: 836
|
moderatori: pirat, Lazarus Long, XXX-Man, vincimus
1
+/- sve poruke
ravni prikaz
starije poruke gore
17 godina
neaktivan
offline
Otkriven sigurnosni propust u Chrome-u

Po Tom's Hardware-u kažu kako je otkriven veći sigurnosni propust u Google-ovom Chrome-u:

 

A few hours after the launch of the Chrome public Beta, security researcher Aviv Raff found a hole in the new browser. The new found flaw targets an older version of the WebKit rendering engine. Apple’s latest Safari release uses a newer version of WebKit which is immune from this specific flaw, however Chrome does not.

Aviv Raff has publicized a ‘proof-of-concept’ demonstration showcasing this vulnerability. The demonstration causes Firefox to prompt its users of a Java JAR file download. In Chrome, the file is automatically downloaded without any prompting to the users desktop. Malicious programmers with some good con-artist skills could easily use this vulnerability to trick users in to executing the Java application. The possibilities with what the Java does are endless at this point, just use your imagination.

Raff’s demonstration uses a simple Java based text editing application. You can view the demonstration here.

Intel Core2 Duo E8400 6MB, 4GB OCZ Gold 800Mhz, Gainward GF8800GTS 640MB, Gigabyte X38-DS4 Ultra Durable 2
Moj PC  
0 0 hvala 0
17 godina
offline
RE: Otkriven sigurnosni propust u Chrome-u
Dado_ZG78 kaže...

Po Tom's Hardware-u kažu kako je otkriven veći sigurnosni propust u Google-ovom Chrome-u:

 

A few hours after the launch of the Chrome public Beta, security researcher Aviv Raff found a hole in the new browser. The new found flaw targets an older version of the WebKit rendering engine. Apple’s latest Safari release uses a newer version of WebKit which is immune from this specific flaw, however Chrome does not.

Aviv Raff has publicized a ‘proof-of-concept’ demonstration showcasing this vulnerability. The demonstration causes Firefox to prompt its users of a Java JAR file download. In Chrome, the file is automatically downloaded without any prompting to the users desktop. Malicious programmers with some good con-artist skills could easily use this vulnerability to trick users in to executing the Java application. The possibilities with what the Java does are endless at this point, just use your imagination.

Raff’s demonstration uses a simple Java based text editing application. You can view the demonstration here.

Hahha da. Skinuo mi automatski jar file koji nakon pokretanja pokreće notepad. Jasno, moguće je pokrenuti i nešto drugo osim notepada.
Chromes major security issue in action Chromes major security issue in action
1
Nova poruka
E-mail:
Lozinka:
 
vrh stranice