Google发布漏洞利用代码 威胁数百万Chromium用户

AI导读

谷歌近日公开了Chromium浏览器引擎中一项存在29个月未修复漏洞的利用代码。该漏洞影响Chrome、Microsoft Edge等基于Chromium的浏览器。攻击者可利用Fetch API建立持久化后台连接,即使用户重启设备仍会恢复。此漏洞可被任意网站触发,相当于植入后门,使设备沦为僵尸网络节点。攻击者借此可监控用户活动、提供匿名代理、发起DDoS攻击,并可能结合其他漏洞实现大规模设备控制,凸显了长期未修复漏洞的严重安全隐患。

AI Prism 智棱 - 计算机视觉 分类封面图
Google on Wednesday published exploit code for an unfixed vulnerability in its Chromium browser codebase that threatens millions of people using Chrome, Microsoft Edge, and virtually all other Chromium-based browsers. The proof-of-concept code exploits the Browser Fetch programming interface, a standard that allows long videos and other large files to be downloaded in the background. An attacker can use the exploit to create a connection for monitoring some aspects of a user’s browser usage and as a proxy for viewing sites and launching denial-of-service attacks. Depending on the browser, the connections either reopen or remain open even after it or the device running it has rebooted. Unfixed for 29 months (and counting) The unfixed vulnerability can be exploited by any website a user visits. In effect, a compromise amounts to a limited backdoor that makes a device part of a limited botnet. The capabilities are limited to the same things a browser can do, such as visit malicious sites, provide anonymous proxy browsing by others, enable proxied DDoS attacks, and monitor user activity. Nonetheless, the exploit could allow an attacker to wrangle thousands, possibly millions, of devices into a network. Once a separate vulnerability becomes available, the attacker could use it to then compromise all those devices.Read full article Comments

内容声明

本文内容基于公开市场信息与媒体报道进行整理,部分观点来自社区讨论。如涉及事实性问题,欢迎通过 xurj005@163.com 与我们指正,我们将及时核实并更新。