{"id":239689,"date":"2012-05-23T15:10:29","date_gmt":"2012-05-23T15:10:29","guid":{"rendered":"http:\/\/www.eugenesis.com\/anatomy-of-a-hack-6-separate-bugs-needed-to-bring-down-google-browser-updated\/"},"modified":"2012-05-23T15:10:29","modified_gmt":"2012-05-23T15:10:29","slug":"anatomy-of-a-hack-6-separate-bugs-needed-to-bring-down-google-browser-updated","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/anatomy\/anatomy-of-a-hack-6-separate-bugs-needed-to-bring-down-google-browser-updated.php","title":{"rendered":"Anatomy of a hack: 6 separate bugs needed to bring down Google browser (Updated)"},"content":{"rendered":"<p><p>    After exploiting six different Chrome vulnerabilities, a hacker    named Pinkie Pie was able to display this image on his target    machine.  <\/p>\n<p>    Dan Goodin  <\/p>\n<p>    An exploit that fetched a teenage hacker a $60,000 bounty    targeted six different security bugs to break out of the    security sandbox fortifying Google's Chrome browser.  <\/p>\n<p>    The extreme lengths     taken in March by a hacker identified only as Pinkie Pie    underscore the difficulty of piercing this safety perimeter.    Google developers have erected their sandbox to separate Web    content from sensitive operating-system functions, such as the    ability to read and write files to a hard drive. Such sandboxes    are designed to minimize the damage that can be done when    attackers identify and exploit buffer overflows and other types    of software bugs that inevitably find their way into complex    bodies of code.  <\/p>\n<p>    Pinkie Pie's attack came during Pwnium, a     contest that awarded $60,000 prizes to hackers who    successfully broke out of the protective barrier by exploiting    only vulnerabilities residing in code that is native to the    Google browser. The teenager was one of only two contestants to    win the top prize. He did it after executing a custom-written    Netscape    Plugin Application Programming Interface directly on a Dell    Inspiron laptop that ran a fully patched version of Chrome on a    fully patched version of Microsoft's Windows 7 operating    system. Google patched the severest of the vulnerabilities    within 24 hours of them being exploited.  <\/p>\n<p>    According to     technical details Google published Tuesday, Pinkie Pie's    odyssey began by exploiting a bug    in aprerendering engine that helps Chrome work faster    by gathering clues about webpages before they're loaded. By    combining the attack with a second one that exploited a        separate bug, he was able to inject a tiny, eight-byte    address into a highly restricted section of the browser that    processes commands sent to graphics cards.  <\/p>\n<p>    By guessing some predictable addresses allocated by Windows, he    was able to execute the snippet using a technique known as    return-oriented programming, which extracts pieces of code    present in executable memory areas and rearranges them to form    a malicious payload. Although graphics processes are sandboxed,    their restrictions are more permissive than the parts of Chrome    that render HTML and Native Client processes. That allowed the    hacker to tap Chrome's     inter-process communications channelwhich allows different    parts of the browser to work togetherand exploit two    additional bugs described here    and here.    They allowed his code to gain additional privileges so it could    access the part of Chrome that runs NPAPI plugins. (Note: To    keep similar bugs from being exploited in other programs,    Google is delaying the disclosure of some details. Some of    these links may not work immediately.)  <\/p>\n<p>    By exploiting two more bugs here    and here,    he was finally able to break out of the sandbox. The Dell    Inspiron responded by displaying an image of a pink pony    wielding a medieval axe, but it could just as easily have    loaded a backdoor trojan that gave Pinkie Pie complete control    over the machine.  <\/p>\n<p>    In an e-mail that arrived after this article was published,    Pinkie Pie said Google's deep-dive analysis varied widely from    the way he thought about the attack when he was fashioning it.  <\/p>\n<p>    \"It's interesting to see the bugs listed this way because when    writing the exploit I only counted three bugs, not six,\" he    wrote. \"117417, 117715, and 117736 are all hardening measures    that enforce security boundaries that don't strictly need to    exist, which I guess is a good thing.\"  <\/p>\n<\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/security\/2012\/05\/anatomy-of-a-hack-6-separate-bugs-needed-to-bring-down-google-browser\/\" title=\"Anatomy of a hack: 6 separate bugs needed to bring down Google browser (Updated)\">Anatomy of a hack: 6 separate bugs needed to bring down Google browser (Updated)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> After exploiting six different Chrome vulnerabilities, a hacker named Pinkie Pie was able to display this image on his target machine. Dan Goodin An exploit that fetched a teenage hacker a $60,000 bounty targeted six different security bugs to break out of the security sandbox fortifying Google's Chrome browser. The extreme lengths taken in March by a hacker identified only as Pinkie Pie underscore the difficulty of piercing this safety perimeter.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/anatomy\/anatomy-of-a-hack-6-separate-bugs-needed-to-bring-down-google-browser-updated.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[577281],"tags":[],"class_list":["post-239689","post","type-post","status-publish","format-standard","hentry","category-anatomy"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/239689"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=239689"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/239689\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=239689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=239689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=239689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}