Issue metadata
Sign in to add a comment
|
Security: Google Update fails to validate library certificate
Reported by
ogoid.ba...@gmail.com,
Mar 8 2017
|
||||||||||||||||||||
Issue descriptionI'm not sure if this qualifies for the rewards program, as it involves local dll loading, but seems a significant security issue as it allows an attacker to impersonate Google's identity. Basically, GoogleUpdate.exe checks the code signing of some libraries before loading, but will also load a goopdate.dll file without signature on the same dir. For example, this allows an attacker to distribute GoogleUpdate.exe together with a malware dll which requests for rights elevation, and trick the user into accepting it, as the request screen will show Google's signature. I attached a sample dll which when loaded exploits this vulnerability. Just execute GoogleUpdate.exe, and note how the elevation request assures Google's identity. Shouldn't GoogleUpdate.exe always check for code signature before calling LoadLibrary?
,
Jun 15 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||
Comment 1 by elawrence@chromium.org
, Mar 8 2017Status: Duplicate (was: Unconfirmed)