|05-22-12, 06:40 PM||#1|
Join Date: Jun 2009
Anatomy of a hack: 6 separate bugs needed to bring down Google browser
After exploiting six different Chrome vulnerabilities, a hacker named Pinkie Pie was able to display this image on his target machine.
An exploit that fetched a teenage hacker a $60,000 bounty targeted six different security bugs to break out of the security sandbox fortifying Google's Chrome browser.
The extreme lengths taken in March by a hacker identified only as Pinkie Pie underscore the difficulty of piercing this safety perimeter. Google developers have erected their sandbox to separate Web content from sensitive operating-system functions, such as the ability to read and write files to a hard drive. Such sandboxes are designed to minimize the damage that can be done when attackers identify and exploit buffer overflows and other types of software bugs that inevitably find their way into complex bodies of code.
Pinkie Pie's attack came during Pwnium, a contest that awarded $60,000 prizes to hackers who successfully broke out of the protective barrier by exploiting only vulnerabilities residing in code that is native to the Google browser. The teenager was one of only two contestants to win the top prize. He did it after executing a custom-written Netscape Plugin Application Programming Interface directly on a Dell Inspiron laptop that ran a fully patched version of Chrome on a fully patched version of Microsoft's Windows 7 operating system. Google patched the severest of the vulnerabilities within 24 hours of them being exploited.
Read more | Comments
|Thread||Thread Starter||Forum||Replies||Last Post|
|Google (partially) loses suit to Oracle over use of Java API's||ViN86||Mobile Devices And Smartphones||3||05-17-12 10:25 AM|