Yet Another Google Chrome Sandbox Critical Exploit by Turkish security experts



Turkish security experts from Arf Iskenderun Technologies, finds the new vulnerability open in Google Chrome 17.0.963.78 , same risk working on new update 17.0.963.79 and bypass Chrome SandBox.

Last week, Vupen Security reports that it has officially "pwned" Google Chrome's sandbox. Vupen hacked Chrome 17.0.963.66 update. But, Turkish security experts claim that they hacked Chrome Sandbox after Vupen and This vulnerability is critical for Chrome. 
A sandbox is security mechanism used to run an application in a restricted environment. If an attacker is able to exploit the browser in a way that lets him run arbitrary code on the machine, the sandbox would help prevent this code from causing damage to the system. The sandbox would also help prevent this exploit from modifying and even reading your files or any information on the system.

Maiden says that their objective is to make the internet a safer environment, "Google Chrome as much as we aim to contribute to the determination of deficits. That were identified as soon as possible and we hope that publishing this open will be closed by Google. We carry this conviction that the strategic gap. Because safety is exceeded SandBox Chrome browser via the browser, any attacker can perform the attack, "he said
 
In First video Turkish experts hacked Chrome Sandbox same Vupen's hacked update.
 
 
In Another Video, Experts hack the Latest Chrome version 17.0.963.78.
 
 
 
 
Arf Technology, company which works in the software security Erkan Demirkan, to identify security vulnerabilities in software, and stated that the work of a number of close the vulnerability gap.
 
 
thehackernews.com 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.