exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Google Chrome Clipboard Format Processing Sandbox Escape

Google Chrome Clipboard Format Processing Sandbox Escape
Posted Mar 26, 2014
Authored by VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Google Chrome. The vulnerability is caused by an input validation error within the "Clipboard::WriteData()" function that does not restrict the value of the "format" parameter, which could be exploited to escape Chrome's sandbox and achieve code execution with Medium integrity level. Google Chrome versions prior to 33.0.1750.154 are affected.

tags | advisory, code execution
SHA-256 | 1e839c35cc0103dc89491b813b56882dd52230a8917c7b3e18e00a97251c90dd

Google Chrome Clipboard Format Processing Sandbox Escape

Change Mirror Download
VUPEN Security Research - Google Chrome Clipboard Format Processing
Sandbox Escape (Pwn2Own)

Website : http://www.vupen.com

Twitter : http://twitter.com/vupen


I. BACKGROUND
---------------------

"Google Chrome is a freeware web browser developed by Google. Chrome
version 28 and beyond uses the WebKit fork Blink. As of 2013,
StatCounter estimates that Google Chrome has a 39% worldwide usage
share of web browsers" (Wikipedia).


II. DESCRIPTION
---------------------

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Google Chrome.

The vulnerability is caused by an input validation error within the
"Clipboard::WriteData()" function that does not restrict the value of
the "format" parameter, which could be exploited to escape Chrome's
sandbox and achieve code execution with Medium integrity level.


III. AFFECTED PRODUCTS
---------------------------

Google Chrome versions prior to 33.0.1750.154


IV. SOLUTION
----------------

Upgrade to Chrome version version 33.0.1750.154.


V. CREDIT
--------------

This vulnerability was discovered by VUPEN Security.


VI. ABOUT VUPEN Security
---------------------------

VUPEN is the leading provider of defensive and offensive cyber security
intelligence and advanced zero-day research. All VUPEN's vulnerability
intelligence results exclusively from its internal and in-house R&D
efforts conducted by its team of world-class researchers.

VUPEN Solutions: http://www.vupen.com/english/services/


VII. REFERENCES
----------------------

http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_14.html


VIII. DISCLOSURE TIMELINE
-----------------------------

2013-12-19 - Vulnerability Discovered by VUPEN Security
2014-03-13 - Vulnerability Reported to Google/ZDI During Pwn2Own 2014
2014-03-14 - Vulnerability Fixed by Google
2014-03-26 - Public disclosure
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close