Issue metadata
Sign in to add a comment
|
Security: Local provisioning packages allow persistence after OS reinstall
Reported by
petros...@gmail.com,
Feb 21 2018
|
||||||||||||||||||
Issue descriptionThis template is ONLY for reporting security bugs. If you are reporting a Download Protection Bypass bug, please use the "Security - Download Protection" template. For all other reports, please use a different template. Please READ THIS FAQ before filing a bug: https://chromium.googlesource.com /chromium/src/+/master/docs/security/faq.md Please see the following link for instructions on filing security bugs: https://www.chromium.org/Home/chromium-security/reporting-security-bugs NOTE: Security bugs are normally made public once a fix has been widely deployed. VULNERABILITY DETAILS Installation of local provisioning packages onto Chrome OS devices, Windows devices, Apple Devices, and Android Devices enable malicious code to persist following OS reinstallation, allowing the provisioned and infected systems to be returned to local retail stores and sold to unsuspecting end-users, or sold on secondary markets to unsuspecting end-users. Future web traffic, downloads, and secure form information on these infected devices is then able to be passed through the provisioners' own proxy server, where this information would able to be captured and sold, or used for malicious purposes. This type of exploit has wide-reaching implications, and is capable of being deployed rapidly and systemically on a global scale. VERSION Chrome Version: Any + Any Operating System: Chrome OS, Chromium, Microsoft Windows, iOS, Mac OS REPRODUCTION CASE Please include a demonstration of the security bug, such as an attached HTML or binary file that reproduces the bug when loaded in Chrome. PLEASE make the file as small as possible and remove any content not required to demonstrate the bug. FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION Type of crash: [tab, browser, etc.] Crash State: [see link above: stack trace *with symbols*, registers, exception record] Client ID (if relevant): [see link above]
,
Feb 21 2018
I assume the term "provisioning packages" is referring to said Microsoft technology. There is no equivalent for Chrome OS that I am aware of, please elaborate on specifics.
Also, Chrome OS' re-installation process ("Chrome OS recovery") actually is designed to wipe out any code that has previously been installed. If you have evidence for the contrary, that'd indeed be a bug. Again, please provide details.
I'll close this bug now given that there's non evidence of actual security issues. Feel free to provide more context in comments - happy to reopen if you provide specifics of an actual bug.
,
May 31 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by elawrence@chromium.org
, Feb 21 2018Summary: Security: Local provisioning packages allow persistence after OS reinstall (was: Security: )