contents

software
 
Google Desktop Vulnerability Discovered

Watchfire announces its security researchers have discovered a vulnerability in Google Desktop which could enable a malicious individual to achieve not only remote, persistent access to sensitive data, but in some conditions full system control. Watchfire’s security researchers have uncovered a new attack methodology that clearly emphasizes the danger of integration between desktop applications and web-based applications as an aperture for a malicious attacker to escalate his/her privileges by crossing from the Web environment to the desktop application environment. This outcome is the combined result of the integration between the Google.com Web site and Google Desktop, and Google Desktop’s failure to properly encode output containing malicious or unexpected characters.

This attack describes how the malicious logic acts as a parasite, using JavaScript code to control Google Desktop functionality. While evading current information protection systems, such as anti-virus software and firewalls, the attacker could covertly hijack sensitive local information.

In this paper Watchfire details the methodology of attack and provides a valid use case including a description of the basic technique and some theoretical outcomes. Finally, Watchfire provides fix recommendations that are appropriate for Google Desktop, as well as for many other web-based applications. Google has been responsive and has issued a patch which mitigates the immediate risk of the attack.



write your comments about the article :: © 2007 Networking News :: home page