Chrome bug no security threat, argues Google

Requires too many conditions, too much user interaction to classify as vulnerability

Google's Chrome contains a critical vulnerability that under certain circumstances allows attackers to plant malware on a Windows PC, a security company said last week.

According to Slovenia-based Acros Security, Google would not categorize the bug as a vulnerability, and instead called it a "strange behavior that [they] should consider changing."

The vulnerability, said Mitja Kolsek, Acros' CEO, is one of a string in Windows programs that relies on an attack strategy variously dubbed "DLL load hijacking," "binary planting" and "file planting."

The attack jumped into public view in August 2010 when HD Moore, the creator of the Metasploit penetration hacking toolkit and chief security officer at Rapid7, found dozens of vulnerable Windows applications. Moore's report was followed by others, including several from Kolsek and Acros.

Many Windows applications don't call DLLs, or dynamic link libraries, using a full path name, but instead use only the filename, giving hackers a way to trick an application into loading a malicious file with the same title as a required DLL. If attackers can dupe users into visiting malicious Web sites or remote shared folders, or get them to plug in a USB drive -- and in some cases con them into opening a file -- they can hijack a PC and plant malware on it.

Microsoft, for instance, has provided 17 security updates in the last 13 months to fix DLL load hijacking problems, most recently earlier this month.

The newest, however, affects Chrome, the browser that -- because of its "sandbox" technology that isolates the browser from the rest of the system -- most security experts believe is the safest of the top five.

Chrome's sandbox doesn't protect against this DLL load hijacking, said Acros in a lengthy write-up of the vulnerability.

The silver linking? Hackers have to have the stars perfectly aligned to exploit the bug, said Acros.

For the vulnerability to be exploited, Chrome must be set to use a search engine other than Google's, which is, not surprisingly, the default for Google's browser. Acros confirmed that an attack can be successfully launched against Chrome when users set Yahoo or Bing as the browser's preferred search site.

1 2 Page
FREE Computerworld Insider Guide: Five IT certifications that won’t break you
Join the discussion
Be the first to comment on this article. Our Commenting Policies