Writeup by Amit Klein (Trusteer): "Google Chrome 3.0 (Beta) Math

看板Bugtraq作者時間16年前 (2009/09/01 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
Hi list I would like to announce a new writeup, titled "Google Chrome 3.0 (Beta) Math.random vulnerability". The writeup is available in the following URL: http://www.trusteer.com/files/Google_Chrome_3.0_Beta_Math.random_vulnerability.pdf Abstract: The revised Google Chrome Math.random algorithm (included in version 3.0 of Google Chrome) is predictable. This paper describes how Google Chrome 3.0 Math.random's internal state can be reconstructed, and how it can be rolled forward and backward, and how (in Windows) the exact seeding time can be extracted. This in turn leads to various attacks (e.g. "in-session phishing") as described in an earlier paper (http://www.trusteer.com/files/Temporary_User_Tracking_in_Major_Browsers.pdf). Thanks, -Amit Amit Klein, CTO, Trusteer
文章代碼(AID): #1Ad0_Zom (Bugtraq)