Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Chrome Google Security Technology

Researcher Claims To Have Chrome Zero-Day, Google Says "Prove It" 106

chicksdaddy writes "Google's been known to pay $60,000 for information on remotely exploitable vulnerabilities in its Chrome web browser. So, when a researcher says that he has one, but isn't interested in selling it, eyebrows get raised. And that's just what's happening this week, with Google saying it will wait and see what Georgian researcher Ucha Gobejishvili has up his sleeve in a presentation on Saturday at the Malcon conference in New Delhi. Gobejishvili has claimed that he will demonstrate a remotely exploitable hole in the Chrome web browser at Malcon. He described the security hole in Chrome as a 'critical vulnerability' in a Chrome DLL. 'It has silent and automatically (sp) download function and it works on all Windows systems,' he told Security Ledger. However, more than a few questions hang over Gobejishvili's talk. The researcher said he discovered the hole in July, but hasn't bothered to contact Google. He will demonstrate the exploit at MalCon, and have a 'general discussion' about it, but won't release source code for it. 'I know this is a very dangerous issue that's why I am not publishing more details about this vulnerability,' he wrote. Google said that, with no information on the hole, it can only wait to hear the researcher's Malcon presentation before it can assess the threat to Chrome users."
This discussion has been archived. No new comments can be posted.

Researcher Claims To Have Chrome Zero-Day, Google Says "Prove It"

Comments Filter:
  • by Anonymous Coward on Wednesday November 21, 2012 @11:12PM (#42063569)

    This security researcher has a track record of not understanding even basic security concepts.

    Basic misunderstanding of "memory corruption" vs. an "out of memory" condition:

    Basic misunderstanding of web security and the capabilities of Javascript:

    This does not preclude the case where he's stumbled across something real, but it seems highly unlikely.

  • by Justin_Schuh (322319) on Thursday November 22, 2012 @12:50AM (#42063993)

    Here's every "security" report he's made against Chrome. [] None were valid.

  • by dissy (172727) on Thursday November 22, 2012 @02:40AM (#42064377)

    I seriously doubt any of the big zero-day sellers (or buyers for that matter) would be interested in an "exploit" where you use java script to change the *status bar* (Not address bar) to spoof what URL a link actually goes to.

    Yes, that really is what this person considers an exploit, and he has never discovered nor shown he understands anything more complex than that :P

  • by ameen.ross (2498000) on Thursday November 22, 2012 @06:05AM (#42064991)


    The very first video where he purportedly shows an Office 2010 0-day vulnerability ("it has silent and automatically download function"), I noticed he right clicked the desktop and clicked pressed "refresh"...
    He then moves on to show that he really is running Office 2010, and then he opens a link, not a word file, which opens MS Word and then opens a local, not silently downloaded, executable: Putty. He finishes by typing "1337" in the connectbox of Putty.

    There are unthinkably many scenarios that lead to this behavior, but this dude having been able to find an actual 0-day vulnerability in any software is not one of them.

Is a computer language with goto's totally Wirth-less?