Quick update on Google Chrome's Math.random() predictability by

看板Bugtraq作者時間15年前 (2010/11/17 05:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
Hi list, This is a quick update regarding Google Chrome's Math.random implementation= and its vulnerability. Our original results with Google Chrome 3.0 and abo= ve don't hold as-is for Google 6.0 and above due to a change introduced in = the Google Chrome Math.random implementation. However, the attack algorithm= can be modified to take this change into account, so the vulnerability is = still in effect. As reported earlier, it is possible to read application st= ates across domains, thus enabling for e.g. in-session phishing. This was r= eported to Google's security team earlier this year, which responded by sta= ting that there is no ETA for a fix and we're free to publish our results.= =20 For additional details, please read the full paper at: http://www.trusteer.com/sites/default/files/Google_Chrome_6.0_and_7.0_Math.= random_vulnerability.pdf Thanks, -Amit Amit Klein, CTO, Trusteer
文章代碼(AID): #1CulXIId (Bugtraq)