Jump to content

Google Chrome / Windows Zeroday Exploit

Google researchers discovered a Windows exploit involving local system privileges being combined by attackers with a separate Google Chrome security flaw patched last Friday. While the Chrome exploit is inactive after Google rolled out a security update, Windows users running old versions are still at risk.

 

"The flaw, which resides in the Windows win32k.sys kernel driver, gives attackers a means to break out of security sandboxes that Chrome and most other browsers use to keep untrusted code from interacting with sensitive parts of an OS. Attackers combined an exploit for this vulnerability with an exploit for CVE-2019-5786, a use-after-free bug in Chrome’s FileReader component. The Windows vulnerability is a NULL pointer dereference in win32k!MNGetpItemFromIndex when the NtUserMNDragOver() system call is called under specific circumstances." - Ars Technica

 

While Google released a patch for chrome a week ago the update requires a browser restart to take effect unlike the previous chrome exploit involving the Adobe Flash plug-in which did not require a restart. Clement Lecigne, a member of Google’s Threat Analysis Group advises that all Windows users upgrade to version 10.

 

(source - https://arstechnica.com/information-technology/2019/03/attackers-are-actively-exploiting-a-serious-windows-zeroday-in-the-wild/)

Link to comment
Share on other sites

Link to post
Share on other sites

Chrome is sinking fast.

Stinkpci5 3550. DDR3 1600mhz 8GB. Gigabyte GA-H61N-USB3.0. Sapphire RX 570 Nitro 4GB oc. Noctua NH-L12. WD Black 600GB. Silverstone PSU 1KW. Advent 1440x900 75hz VGA monitor 1ms. Acer Veriton M464 chassis.

Self help guide.

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, domroderiguez said:

Google researchers discovered a Windows exploit involving local system privileges being combined by attackers with a separate Google Chrome security flaw patched last Friday. While the Chrome exploit is inactive after Google rolled out a security update, Windows users running old versions are still at risk.

 

"The flaw, which resides in the Windows win32k.sys kernel driver, gives attackers a means to break out of security sandboxes that Chrome and most other browsers use to keep untrusted code from interacting with sensitive parts of an OS. Attackers combined an exploit for this vulnerability with an exploit for CVE-2019-5786, a use-after-free bug in Chrome’s FileReader component. The Windows vulnerability is a NULL pointer dereference in win32k!MNGetpItemFromIndex when the NtUserMNDragOver() system call is called under specific circumstances." - Ars Technica

 

While Google released a patch for chrome a week ago the update requires a browser restart to take effect unlike the previous chrome exploit involving the Adobe Flash plug-in which did not require a restart. Clement Lecigne, a member of Google’s Threat Analysis Group advises that all Windows users upgrade to version 10.

 

(source - https://arstechnica.com/information-technology/2019/03/attackers-are-actively-exploiting-a-serious-windows-zeroday-in-the-wild/)

Sorry, I didn't see that this story was already posted. I found the original post and is linked below.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

nice to see Google letting MS know ahead of time as usual before they let the public know 

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, floofer said:

nice to see Google letting MS know ahead of time as usual before they let the public know 

Not sure if that's sarcasm since you in the other thread posted:

On 3/7/2019 at 2:49 AM, floofer said:

Major exploits in other software and operating systems is ok however, by google, to blab out to everyone.

but yes, Google did in fact reach out to Microsoft before making any of this public.

 

Google always gives at least a 90 days notice before going public with information about vulnerabilities. As far as I know, they have never made a vulnerability public until after having waited 90 days.

Link to comment
Share on other sites

Link to post
Share on other sites

Quote

“To date, we have only observed active exploitation against Windows 7 32-bit systems.”

 

In other words : 99% of Win7 users have nothing to worry about. 

There's no need for the alarmist "quick, get Windows 10 or you'll be haxxored !!!!1!" advice.  Win7 64bit and Win8.1 is just fine

Link to comment
Share on other sites

Link to post
Share on other sites

Why use Google Chrome though? 

| Ryzen 7 7800X3D | AM5 B650 Aorus Elite AX | G.Skill Trident Z5 Neo RGB DDR5 32GB 6000MHz C30 | Sapphire PULSE Radeon RX 7900 XTX | Samsung 990 PRO 1TB with heatsink | Arctic Liquid Freezer II 360 | Seasonic Focus GX-850 | Lian Li Lanccool III | Mousepad: Skypad 3.0 XL / Zowie GTF-X | Mouse: Zowie S1-C | Keyboard: Ducky One 3 TKL (Cherry MX-Speed-Silver)Beyerdynamic MMX 300 (2nd Gen) | Acer XV272U | OS: Windows 11 |

Link to comment
Share on other sites

Link to post
Share on other sites

@domroderiguez I'll add this to my topic :)

PLEASE QUOTE ME IF YOU ARE REPLYING TO ME

Desktop Build: Ryzen 7 2700X @ 4.0GHz, AsRock Fatal1ty X370 Professional Gaming, 48GB Corsair DDR4 @ 3000MHz, RX5700 XT 8GB Sapphire Nitro+, Benq XL2730 1440p 144Hz FS

Retro Build: Intel Pentium III @ 500 MHz, Dell Optiplex G1 Full AT Tower, 768MB SDRAM @ 133MHz, Integrated Graphics, Generic 1024x768 60Hz Monitor


 

Link to comment
Share on other sites

Link to post
Share on other sites

9 hours ago, LAwLz said:

Not sure if that's sarcasm since you in the other thread posted:

 

but yes, Google did in fact reach out to Microsoft before making any of this public.

 

Google always gives at least a 90 days notice before going public with information about vulnerabilities. As far as I know, they have never made a vulnerability public until after having waited 90 days.

Doesn’t look that way at all.

Link to comment
Share on other sites

Link to post
Share on other sites

Not sure why this really matters?

 

Chrome is already spyware.trash.stealing data from everything you do.

 

How is that any different from someone doing so from an exploit?

What does windows 10 and ET have in common?

 

They are both constantly trying to phone home.

Link to comment
Share on other sites

Link to post
Share on other sites

Guest
This topic is now closed to further replies.

×