HomeBusinessHardwareSoftwareTelecomsPersonal TechnologyComment

 


















ZDNet UK > News > Story




Previous Story: New DVD spec gains speed Next Story: Troubled Marconi trims yet more jobs
Google toolbar exposes PCs to attack
12:26 Friday 9th August 2002
Matthew Broersma 

Researchers say the popular toolbar for Internet Explorer allows attackers to read local files and execute malicious commands

An Israeli security firm has discovered a security vulnerability in Google's Internet Explorer toolbar that could allow an attacker to run malicious code on a user's PC, read private files, and carry out other intrusions.

According to GreyMagic Software, a flaw in the Google Toolbar version 1.1.58 and earlier allows an attacker to embed code in any Web page that fools the toolbar into executing the attacker's commands. These commands can include altering the toolbar's parameters, which allows the attacker to hijack searches, alter the appearance of the toolbar or uninstall it completely. It also, more dangerously, allows the attacker to execute code on the user's PC.

Advertisement
Google issued a new version of the toolbar fixing the problem, via its automatic update feature, on Wednesday. As of Friday, the current version of the toolbar is 1.1.60.

GreyMagic's exploits centre around the fact that the toolbar uses simple URLs to control the software's features or execute scripts. Changes to the toolbar settings are made via a URL such as "http://toolbar.google.com/command?(changes here)", and scripts can be executed at "http://toolbar.google.com/command?script=(any script)".

The toolbar only allows changes to take place if the document being viewed in the browser is in the google.com domain, or is viewing any location using a special "resource" protocol, meant for accessing system resources on the local computer. (Resource protocol addresses take the form "res://(address)".)

However, GreyMagic demonstrated that this restriction could be easily circumvented by opening a "res://" or google.com page, and then using a script to change the URL to the desired malicious address.

All a Google Toolbar user would have to do would be to visit a particular URL -- which could be distributed through an email, for example -- and a script embedded in the page could read files on the user's hard disk, alter the configuration of the toolbar to hijack searches or execute malicious commands. Since the commands can be executed in the "My Computer" security zone, they do not have many restrictions.

GreyMagic said that several demonstrations of such exploits are available on its Web site.


For all security-related news, including updates on the latest viruses, hacking exploits and patches, check out ZDNet UK's Viruses and Hacking News Section.

Have your say instantly, and see what others have said. Go to the Security forum.

Let the editors know what you think in the Mailroom.


Related Links
Windows API 'flaw' sparks security debate
Security flaw hits Windows, Mac, Linux
Security hole hits patched Internet Explorer
Previous Story: New DVD spec gains speed Next Story: Troubled Marconi trims yet more jobs
Search Email Printer friendly
Sponsored by Epson

Latest News




Job of the day




Comment and Analysis

Rupert Goodwins Rupert Goodwins' Diary
Hotmail strikes again


Peter Judge Peter Judge
Ofcom's Currie has a lot on his plate


 

ZDNet UK Video

Latest videos
Exclusive interviews, the coolest gadgets and our pick of the keynotes - catch them now


 

Talk to us

mailroom@zdnet.co.uk
Send us your comments
News forum
Join the discussions






















 CNET Networks: CNET | GameSpot | mySimon | TechRepublic | ZDNet
Copyright © 2002 CNET Networks, Inc. All Rights Reserved.
ZDNET is a registered service mark of CNET Networks, Inc. ZDNET Logo is a service mark of CNET NETWORKS, Inc.