<![CDATA[Latest posts for the topic "BKIS làm 1 cú nổi tiếng trên milw0rm"]]> /hvaonline/posts/list/13.html JForum - http://www.jforum.net BKIS làm 1 cú nổi tiếng trên milw0rm http://milw0rm.com/sploits/2008-chrome.tgz # milw0rm.com [2008-09-05]]]> /hvaonline/posts/list/24828.html#150002 /hvaonline/posts/list/24828.html#150002 GMT Re: BKIS làm 1 cú nổi tiếng trên milw0rm /hvaonline/posts/list/24828.html#150006 /hvaonline/posts/list/24828.html#150006 GMT Re: BKIS làm 1 cú nổi tiếng trên milw0rm Hoặc nếu kẻ xấu gửi cho nạn nhân một file thực thi, ví dụ: .exe, .bat, .reg... và nạn nhân bị lừa chạy những file đó, thì rõ ràng nạn nhân đã nhường quyền điều khiển máy tính của họ cho những chương trình này, và kẻ xấu có thể thực hiện được bất cứ việc phá hoại nào.   So với việc "He then tricks users into visiting his Website and convinces them to save this Page" thì không biết là có gì khác nhau không?
Nếu các bạn vẫn thực sự chưa rõ thế nào là một lỗ hổng, các bạn vui lòng tham khảo 3 trong số 10 quy tắc bất biến trong việc report lỗ hổng được Microsoft sử dụng: Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore. Dịch sang tiếng Việt: Điều 1: Nếu một kẻ xấu có thể lừa bạn chạy một chương trình của hắn trên máy tính của bạn, thì đó không còn là máy tính của bạn nữa.  
:-D :-D :-D]]>
/hvaonline/posts/list/24828.html#150008 /hvaonline/posts/list/24828.html#150008 GMT
Re: BKIS làm 1 cú nổi tiếng trên milw0rm /hvaonline/posts/list/24828.html#150009 /hvaonline/posts/list/24828.html#150009 GMT Re: BKIS làm 1 cú nổi tiếng trên milw0rm /hvaonline/posts/list/24828.html#150015 /hvaonline/posts/list/24828.html#150015 GMT Re: BKIS làm 1 cú nổi tiếng trên milw0rm /hvaonline/posts/list/24828.html#150024 /hvaonline/posts/list/24828.html#150024 GMT Re: BKIS làm 1 cú nổi tiếng trên milw0rm /hvaonline/posts/list/24828.html#150061 /hvaonline/posts/list/24828.html#150061 GMT Re: BKIS làm 1 cú nổi tiếng trên milw0rm /hvaonline/posts/list/24828.html#150064 /hvaonline/posts/list/24828.html#150064 GMT Re: BKIS làm 1 cú nổi tiếng trên milw0rm http://www.securityfocus.com/bid/31035 Google Chrome Malformed 'href' Tag Remote Denial of Service Vulnerability 2008-09-05 http://www.securityfocus.com/bid/31034 Google Chrome Malformed Attachment Filename Remote Denial of Service Vulnerability 2008-09-05 http://www.securityfocus.com/bid/31031 Google Chrome 'SaveAs' Function 'Title' Tag Buffer Overflow Vulnerability 2008-09-05 Bugtraq ID: 31029 http://www.securityfocus.com/bid/31029 Tại http://www.securityfocus.com/archive/1/496042/30/0/threaded , SecurityFocus có trích report của BKIS nguyên văn như sau:
We (SVRT-Bkis) have just discovered vulnerability in Google Chrome 0.2.149.27. This is a Critical Buffer Overflow Vulnerability permiting hacker to perform a remote attack and take complete control of the affected system. We have submitted this Vulnerability to Google. They confirmed and assign a verifier for build 0.2.149.28. (1) Proof of Concept: We tested Google Chrome 0.2.149.27 on Windows XP SP2 (Open Calculator) http://security.bkis.vn/Proof-Of-Concept/PoC-XPSP2.html With others Windows not XP SP 2: http://security.bkis.vn/Proof-Of-Concept/PoC-Crash.html Details: · Type of Issue : Buffer Overflow. · Affected Software : Google Chrome 0.2.149.27. · Exploitation Environment : Google Chrome on Windows XP SP2. · Impact: Remote code execution. · Rating : Critical. · Description : The vulnerability is caused due to a boundary error when handling the "SaveAs" function. On saving a malicious page with an overly long title (<title> tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems. · How an attacker could exploit the issue : To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Website and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system. · Discoverer : Le Duc Anh - SVRT - Bkis · About SVRT : SVRT, which is short for Security Vulnerability Research Team, is one of Bkis researching groups. SVRT specializes in the detection, alert and announcement of security vulnerabilities in software, operating systems, network protocols and embedded systems. · About Bkis : Bkis (Bach Khoa Internetwork Security) is Vietnamese leading Center in researching, deploying network security software and solutions. (2) · Website : http://security.bkis.vn · Mail : svrt[at]bkav.com.vn 
Comment: (1)"They confirmed and assign a verifier for build 0.2.149.28." nghĩa là: They have confirmed this vulnerability and assigned an expert to correct Google Chrome 0.2.149.27. hay là: They have confirmed the reception of our report and assigned an expert to verify Google Chrome 0.2.149.27 ? (2) : No comment 3- Hoan nghênh BKis ]]>
/hvaonline/posts/list/24828.html#150067 /hvaonline/posts/list/24828.html#150067 GMT
Re: BKIS làm 1 cú nổi tiếng trên milw0rm Just days after it rolled out Chrome, Google Inc. issued an update after Vietnamese security researchers reported a critical vulnerability in the beta browser. According to Le Duc Anh, a researcher at Bach Khoa Internetwork Security (BKIS), which is housed at the Hanoi University of Technology, the Chrome beta posted last week contained a buffer overflow bug that could be used by attackers to hijack PCs. The flaw can be triggered when the user saves a Web page -- using Chrome's "Save page as" command -- with a very long name. That, in turn, creates a stack-based buffer overflow that hackers can leverage to introduce additional malicious code. "To exploit the vulnerability, a hacker might construct a specially-crafted Web page, which contains malicious code," said a security advisory issued by BKIS on Friday. "[The hacker would] then trick users into visiting his site and convince them to save this page. Right after that, the code would be executed, giving him the privilege to make use of the affected system." Chrome 0.2.149.27 is affected by the vulnerability. BKIS maintained that, of several Chrome bugs reported last week, this is the only one that could be used to compromise a computer. Google patched the vulnerability Sunday and released an updated beta, Version 0.2.149.29, the same day. "We've released an update to Google Chrome that fixes many of the issues reported here," said someone identified only as "Simon" in a Chrome support forum yesterday. Simon said that 0.2.149.29 fixes the following: * The ":%" error. * JavaScript trouble on Facebook. * Confirmed security vulnerabilities. He didn't elaborate on what security flaws had been fixed, something users immediately noticed. "May I suggest a public change log to go with the releases?" said "OnePinkSheep" on the same thread. "Change logs are pretty much standard for open-source projects -- the community can't help much if we don't know what's been changed and/or fixed. Also, change logs help reassure the public that a project is actively developed and that the developers appreciate the feedback." The ":%" problem Simon cited refers to a report last week that Chrome crashed when directed to a Web site that had those characters in its URL. Computerworld confirmed that 0.2.149.29 fixed the :% flaw, as well as the "Save page as" buffer overflow reported by BKIS. Other Chrome vulnerabilities, however, remain unpatched. The blended threat that relies on the months-old "carpet bomb" bug first reported in Apple Inc.'s Safari -- which, like Chrome, uses the WebKit browser engine -- has not been fixed, for instance. Already-installed copies of Chrome will update automatically to 0.2.149.29; Google's browser uses a behind-the-scenes update process that doesn't inform the user that an update is about to be installed. "Google Chrome automatically updates to a newer version when one is released," the company said in a support document. "The update process happens silently, whether or not you're using the browser at the time. If Google Chrome is open at the time of the update, you must close the browser and restart for the new version to launch." Users can manually update Chrome by selecting the Tools icon at the far right, then choosing "About Google Chrome." An Update button will appear if a newer version is available. http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=development&articleId=9114287&taxonomyId=11&intsrc=kc_top]]> /hvaonline/posts/list/24828.html#150455 /hvaonline/posts/list/24828.html#150455 GMT Re: BKIS làm 1 cú nổi tiếng trên milw0rm http://bkav.com.vn/tin_tuc_noi_bat/10/09/2008/2/1813/ http://www.microsoft.com/technet/security/bulletin/ms08-053.mspx ]]> /hvaonline/posts/list/24828.html#150647 /hvaonline/posts/list/24828.html#150647 GMT