VDB-12057 · OSVDB 102386 · GCVE-100-12057

Google Chrome 32.0.1700.95 Speech Recognition 权限提升

CVSS 元临时分数当前攻击价格 (≈)CTI兴趣分数
4.3$0-$5k0.00

摘要信息

检测到一个被分类为棘手的安全漏洞,影响Google Chrome 32.0.1700.95。 被影响的是 未知函数,属于Speech Recognition组件。 当被操控时,会导致 权限提升。 另外,有可用的漏洞利用。

细节信息

检测到一个被分类为棘手的安全漏洞,影响Google Chrome 32.0.1700.95。 被影响的是 未知函数,属于Speech Recognition组件。 当被操控时,会导致 权限提升。 使用CWE来声明会导致 CWE-269 的问题。 此安全漏洞在 2014-01-22 由Tal Ater 以Chrome Bugs Allow Sites to Listen to Your Private Conversations编号 以Posting (网站)公开发布。 索取公告的网址是talater.com。 本次披露内容如下:

I discovered this exploit while working on annyang, a popular JavaScript Speech Recognition library.

暂无技术细节。 该漏洞的普及率低于常规水平。 另外,有可用的漏洞利用。 目前漏洞的结构决定了可能的价格范围为美元价USD $0-$5k。 根据MITRE ATT&CK,此问题部署的攻击技术是T1068。 安全公告说明:

A user visits a site, that uses speech recognition to offer some cool new functionality. The site asks the user for permission to use his mic, the user accepts, and can now control the site with his voice. Chrome shows a clear indication in the browser that speech recognition is on, and once the user turns it off, or leaves that site, Chrome stops listening. So far, so good. But what if that site is run by someone with malicious intentions? Most sites using Speech Recognition, choose to use secure HTTPS connections. This doesn’t mean the site is safe, just that the owner bought a $5 security certificate. When you grant an HTTPS site permission to use your mic, Chrome will remember your choice, and allow the site to start listening in the future, without asking for permission again. This is perfectly fine, as long as Chrome gives you clear indication that you are being listened to, and that the site can’t start listening to you in background windows that are hidden to you. When you click the button to start or stop the speech recognition on the site, what you won’t notice is that the site may have also opened another hidden popunder window. This window can wait until the main site is closed, and then start listening in without asking for permission. This can be done in a window that you never saw, never interacted with, and probably didn’t even know was there. To make matters worse, even if you do notice that window (which can be disguised as a common banner), Chrome does not show any visual indication that Speech Recognition is turned on in such windows - only in regular Chrome tabs.

若有长度,则其被标记为 概念验证。 我们估计的零日攻击价值约为$100k 以及更多。

更新版本已可在chrome.google.com下载。

产品信息

类型

供应商

名称

版本

许可证

网站

CPE 2.3信息

CPE 2.2信息

影片

CVSSv4信息

VulDB 向量: 🔍
VulDB 可靠性: 🔍

CVSSv3信息

VulDB 元基础分数: 4.8
VulDB 元临时分数: 4.3

VulDB 基本分数: 4.8
VulDB 临时得分: 4.3
VulDB 向量: 🔍
VulDB 可靠性: 🔍

CVSSv2信息

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
向量复杂性身份验证保密完整性可用性
开锁开锁开锁开锁开锁开锁
开锁开锁开锁开锁开锁开锁
开锁开锁开锁开锁开锁开锁

VulDB 基本分数: 🔍
VulDB 临时得分: 🔍
VulDB 可靠性: 🔍

利用信息

分类: 权限提升
CWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍

身体的: 否
本地: 否
远程: 是

可用性: 🔍
访问: 私人
状态: 概念验证
价格预测: 🔍
当前价格估算: 🔍

0-Day开锁开锁开锁开锁
今天开锁开锁开锁开锁

威胁情报信息

利益: 🔍
活跃演员: 🔍
活跃的APT团体: 🔍

对策信息

建议: 无已知缓解措施
状态: 🔍

0天时间: 🔍

升级: chrome.google.com

时间轴信息

2014-01-22 🔍
2014-01-24 +2 日 🔍
2019-03-30 +1891 日 🔍

来源信息

供应商: google.com
产品: google.com

公告: Chrome Bugs Allow Sites to Listen to Your Private Conversations
研究人员: Tal Ater
状态: 未定义

GCVE (VulDB): GCVE-100-12057
OSVDB: 102386

scip Labs: https://www.scip.ch/en/?labs.20161013

条目信息

已创建: 2014-01-24 10時59分
已更新: 2019-03-30 17時30分
更改: 2014-01-24 10時59分 (47), 2019-03-30 17時30分 (2)
完整: 🔍
Cache ID: 216:323:103

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

讨论

暂时没有任何评论。 语言: zh + en.

请登录后发表评论。

Might our Artificial Intelligence support you?

Check our Alexa App!