Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 14 submissions in the queue.

Submission Preview

Link to Story

Chrome's PDF reader has arbitrary code execution flaw

Accepted submission by exec at 2016-06-10 09:03:10
News

Story automatically generated by StoryBot Version 0.0.1f (Development).

Note: This is the complete story and will need further editing. It may also be covered
by Copyright and thus should be acknowledged and quoted rather than printed in its entirety.

FeedSource: [TheRegister] collected from rss-bot logs

Time: 2016-06-09 03:07:13 UTC

Original URL: http://www.theregister.co.uk/2016/06/09/chromes_pdf_reader_has_arbitrary_code_execution_flaw/ [theregister.co.uk]

Title: Chrome's PDF reader has arbitrary code execution flaw

Suggested Topics by Probability (Experimental) : 33.3 science 16.7 software 16.7 hardware 16.7 careers 16.7 OS

--- --- --- --- --- --- --- Entire Story Below --- --- --- --- --- --- ---
 
 

Chrome's PDF reader has arbitrary code execution flaw

A Researcher at Cisco's Talos limb have discovered an arbitrary code execution flaw in PDFium, the PDF reader installed by default in Google's Chrome browser.

                               

The flaw looks like it is down to a tiny error by Chrome's developers, as Nikolic writes [talosintel.com] that “An existing assert call in the OpenJPEG library prevents the heap overflow in standalone builds, but in the build included in release versions of Chrome, the assertions are omitted.”

                               

That omission means that when PDFium invokes the OpenJPEG library, it can create a buffer overflow. Once that's happened, bad guys can go to town with their own code.

                               

Nikolic writes that Google has fixed the flaw, with a single line of code that changed an assert to an if.

                               

You can take advantage of that change by simply keeping Chrome up to date: version 51.0.2704.63 makes the change to knock the bug on the head. Chrome auto-updates unless instructed to do otherwise, so most users will be protected.

                               

Google acted with impressive speed after learning of the bug: Nikolic says Talos reported the flaw on May 19th and that Google fixed it on May 25th. ®

                               


                                        Sponsored:
                                        Fighting known, unknown, and advanced threats [theregister.com]
                               

                               

-- submitted from IRC


Original Submission