lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 31 Aug 2009 14:25:54 +0300 From: Amit Klein <amit.klein@...steer.com> To: bugtraq@...urityfocus.com Subject: Writeup by Amit Klein (Trusteer): "Google Chrome 3.0 (Beta) Math.random vulnerability" Hi list I would like to announce a new writeup, titled "Google Chrome 3.0 (Beta) Math.random vulnerability". The writeup is available in the following URL: http://www.trusteer.com/files/Google_Chrome_3.0_Beta_Math.random_vulnerability.pdf Abstract: The revised Google Chrome Math.random algorithm (included in version 3.0 of Google Chrome) is predictable. This paper describes how Google Chrome 3.0 Math.random's internal state can be reconstructed, and how it can be rolled forward and backward, and how (in Windows) the exact seeding time can be extracted. This in turn leads to various attacks (e.g. "in-session phishing") as described in an earlier paper (http://www.trusteer.com/files/Temporary_User_Tracking_in_Major_Browsers.pdf). Thanks, -Amit Amit Klein, CTO, Trusteer
Powered by blists - more mailing lists