September 9th, 2008 . by DarkFiber Consulting
Google has released Chrome version 0.2.149.29 to address multiple vulnerabilities. The four vulnerabilities are due to the following:
- a buffer overflow condition in the handling of filenames displayed in the “Save As” dialog
- a buffer overflow condition in the handling of link targets displayed in the status area when a user hovers over a link
- an out-of-bounds memory read error when parsing URLs ending with :%
- a default configuration that allows files to be downloaded to the desktop without prompting the user first
Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition.
Google has indicated that the fixed version is being applied to all users through automatic updates. DarkFiber Consulting encourages users to review the Chrome 0.2.149.29 release notes and upgrade if the newest version has not been automatically applied.
September 3rd, 2008 . by DarkFiber Consulting
DarkFiber Consulting is aware of a vulnerability that affects the Google Chrome web browser. This vulnerability is due to a default configuration that allows files to be downloaded without prompting the user. In addition, downloaded files can be opened with a single click, which could allow a user to inadvertently open a malicious file.
DarkFiber Consulting encourages users to enable the “Ask where to save each file before downloading” option within the “Minor Tweaks” tab in the browser preferences. Although this does not fix the underlying vulnerability, selecting this option will warn the user before files are downloaded. Users should still exercise caution when visiting and downloading items from untrusted websites.
DarkFiber Consulting will provide additional information as it becomes available.