| CVSS 元临时分数 | 当前攻击价格 (≈) | CTI兴趣分数 |
|---|---|---|
| 4.3 | $0-$5k | 0.00 |
摘要
检测到一个被分类为棘手的安全漏洞,影响Google Chrome 32.0.1700.95。 被影响的是 未知函数,属于Speech Recognition组件。 当被操控时,会导致 权限提升。 另外,有可用的漏洞利用。
细节
检测到一个被分类为棘手的安全漏洞,影响Google Chrome 32.0.1700.95。 被影响的是 未知函数,属于Speech Recognition组件。 当被操控时,会导致 权限提升。 使用CWE来声明会导致 CWE-269 的问题。 此安全漏洞在 2014-01-22 由Tal Ater 以Chrome Bugs Allow Sites to Listen to Your Private Conversations编号 以Posting (网站)公开发布。 索取公告的网址是talater.com。 本次披露内容如下:
I discovered this exploit while working on annyang, a popular JavaScript Speech Recognition library.
暂无技术细节。 该漏洞的普及率低于常规水平。 另外,有可用的漏洞利用。 目前漏洞的结构决定了可能的价格范围为美元价USD $0-$5k。 根据MITRE ATT&CK,此问题部署的攻击技术是T1068。 安全公告说明:
A user visits a site, that uses speech recognition to offer some cool new functionality. The site asks the user for permission to use his mic, the user accepts, and can now control the site with his voice. Chrome shows a clear indication in the browser that speech recognition is on, and once the user turns it off, or leaves that site, Chrome stops listening. So far, so good. But what if that site is run by someone with malicious intentions? Most sites using Speech Recognition, choose to use secure HTTPS connections. This doesn’t mean the site is safe, just that the owner bought a $5 security certificate. When you grant an HTTPS site permission to use your mic, Chrome will remember your choice, and allow the site to start listening in the future, without asking for permission again. This is perfectly fine, as long as Chrome gives you clear indication that you are being listened to, and that the site can’t start listening to you in background windows that are hidden to you. When you click the button to start or stop the speech recognition on the site, what you won’t notice is that the site may have also opened another hidden popunder window. This window can wait until the main site is closed, and then start listening in without asking for permission. This can be done in a window that you never saw, never interacted with, and probably didn’t even know was there. To make matters worse, even if you do notice that window (which can be disguised as a common banner), Chrome does not show any visual indication that Speech Recognition is turned on in such windows - only in regular Chrome tabs.
若有长度,则其被标记为 概念验证。 我们估计的零日攻击价值约为$100k 以及更多。
更新版本已可在chrome.google.com下载。
产品
类型
供应商
名称
版本
许可证
网站
CPE 2.3
CPE 2.2
影片

CVSSv4
VulDB 向量: 🔍VulDB 可靠性: 🔍
CVSSv3
VulDB 元基础分数: 4.8VulDB 元临时分数: 4.3
VulDB 基本分数: 4.8
VulDB 临时得分: 4.3
VulDB 向量: 🔍
VulDB 可靠性: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 向量 | 复杂性 | 身份验证 | 保密 | 完整性 | 可用性 |
|---|---|---|---|---|---|
| 开锁 | 开锁 | 开锁 | 开锁 | 开锁 | 开锁 |
| 开锁 | 开锁 | 开锁 | 开锁 | 开锁 | 开锁 |
| 开锁 | 开锁 | 开锁 | 开锁 | 开锁 | 开锁 |
VulDB 基本分数: 🔍
VulDB 临时得分: 🔍
VulDB 可靠性: 🔍
利用
分类: 权限提升CWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
身体的: 否
本地: 否
远程: 是
可用性: 🔍
访问: 私人
状态: 概念验证
价格预测: 🔍
当前价格估算: 🔍
| 0-Day | 开锁 | 开锁 | 开锁 | 开锁 |
|---|---|---|---|---|
| 今天 | 开锁 | 开锁 | 开锁 | 开锁 |
威胁情报
利益: 🔍活跃演员: 🔍
活跃的APT团体: 🔍
对策
建议: 无已知缓解措施状态: 🔍
0天时间: 🔍
升级: chrome.google.com
时间轴
2014-01-22 🔍2014-01-24 🔍
2019-03-30 🔍
来源
供应商: google.com产品: google.com
公告: Chrome Bugs Allow Sites to Listen to Your Private Conversations
研究人员: Tal Ater
状态: 未定义
GCVE (VulDB): GCVE-100-12057
OSVDB: 102386
scip Labs: https://www.scip.ch/en/?labs.20161013
条目
已创建: 2014-01-24 10時59分已更新: 2019-03-30 17時30分
更改: 2014-01-24 10時59分 (47), 2019-03-30 17時30分 (2)
完整: 🔍
Cache ID: 216:323:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
暂时没有任何评论。 语言: zh + en.
请登录后发表评论。