Google Fixes IE Bug 225
aussie_a writes "Without accepting blame Google has quickly patched the vulnerability, without requiring users to download a patch. Previously covered by Slashdot, the flaw allowed people to access files and passwords on a computer via any website when viewed with IE while running Google Desktop." From the article: "'Google was able to address the problem quickly because it didn't require changing any code at the user's desktop,' MacDonald said. 'Google applied more stringent security controls on its main site, which shut down the exploit.' The incident does raise important questions about Google as a desktop software vendor and its plans for rolling out future security fixes, said MacDonald. "
Thanks for Fixing the Problem (Score:4, Insightful)
I don't care who's fault it is. Just fix the problem.
Re:Thanks for Fixing the Problem (Score:5, Interesting)
2 of our ISPs (which are actually government agencies) have blocked IE usage completely. They simply can't get on the network using IE.
This was in response to last week's security issues.
One of the apps we run uses IE specific (Active X) controls. They are not required but they just make it much easier for the users. Now those have been blocked in two locations- causing me a lot of headaches. Of course, the standard answer would be, "why did you use IE specific code?" It was an option for users...but they began to rely upon it.
So I for one, wish that Microsoft would either:
A- fix the security problems
B- release an 'IE Secure' browser, that is stripped down but secure
or
C- Umm...short of fixing the problems I don't have many other needs.
I really wouldn't mind if they had a totally secure version of their browser. Just stripped down functionality (cookies, javascript, etc) and pull out the other junk. Yes...we used some of the other junk, but at the time it seemed like a good idea.
By the way, I am now on the market for a good cross-browser in-line WYSIWYG HTML editor. A flash version would be great too.
Re:Thanks for Fixing the Problem (Score:5, Informative)
http://dynarch.com/projects/htmlarea/ [dynarch.com]
http://fckeditor.net/ [fckeditor.net]
http://bnl.gov/itd/htmleditor/ [bnl.gov]
Re:Thanks for Fixing the Problem (Score:2)
Re:Thanks for Fixing the Problem (Score:2)
You should really consider the second source approach.
Make sure the web app your company runs on works in at least 2 browsers, on 2 OSes.
Make sure the server side can run on disparate hardware using disparate OSes.
Ideally it should run on which install CD you find in the box first.
Re:Thanks for Fixing the Problem (Score:4, Funny)
release an 'IE Secure' browser, that is stripped down but secure
Sure, we'll just take ActiveX out of IE and call it a "secure" version.
Re:Thanks for Fixing the Problem (Score:3, Informative)
Re:Thanks for Fixing the Problem (Score:4, Informative)
Well, to be fair, it is extremely comparable to a Firefox extension or plugin, which have similar rights. I don't think there's really a browser which is safe from this.
I'm not sure what the particular problem with ActiveX is other than the fact that its security model, particularly in old versions, was just pitifully weak (there just wasn't enough forcing people to check a component before installing it). If there's more specific problems, though, I'd like to hear them (always interested).
Re:Thanks for Fixing the Problem (Score:4, Interesting)
Your attitude shows concern for your users, which is good -- it sounds like you put in this feature to make life easier for them, and I think that's great. However the way you implemented it was evidently a bad choice, exchanging ease of use for security, and now your clients have showed where their priorities are: security over ease-of-use.
Now would probably be a good time to either go back to the drawing board and see how you can reimplement those ease of use features, without tying yourselves down to one browser (particularly one that's developing an ever-growing reputation for being insecure and slowly patched). The alternative seems to be dumping the functionality completely, if you can't figure out a way to do it without IE ActiveX. Just waiting or hoping for Microsoft to release a "Secure IE" (how do you know it's secure?) seems foolish, and just begging to be put in the same position again down the road.
I admit I don't like Microsoft much, but I would be saying the same thing if you had written a Firefox-only interface and then some massive security hole was found with it.
Re:Thanks for Fixing the Problem (Score:2)
In fact, what I am currently using is HTMLArea 1.x. (And a few editors prior to that) Someone up above had provided a link to the new HTMLArea 2.x, whic
Re:Thanks for Fixing the Problem (Score:2)
Xinha [xinha.org] was forked from HTMLArea about a year ago, and is under active development by a small group of developers. You'll find it much more stable and usable than HTMLArea, as well as having a large number of plugins that HTMLArea lacks.
Re:Thanks for Fixing the Problem (Score:2)
I think that's the point your parent poster was trying to make.
Re:Thanks for Fixing the Problem (Score:2)
It's IE-only, and unsupported (for good reason) in Firefox, SeaMonkey, Konqueror, Galeon, Safari, OmniWeb, Opera, Lynx, Links...
That's not necessarily so. ActiveX is supportable in other browsers, they just don't do it by default. Here is one project [www.iol.ie] of several that make it possible.
Re:Thanks for Fixing the Problem (Score:2)
I probably should have removed the third comma in my original post
Re:Thanks for Fixing the Problem (Score:2)
This is news. Is there a public media outlet where we could learn about these agencies' decisions? (don't want to get you in trouble...)
Re:Thanks for Fixing the Problem (Score:2)
These aren't customers, they are employees. They do whatever you pay them to do or you get new employees. And customers install plenty of stuff. In fact, they install way too much stuff which is yet another problem. Those comet cursors and waterfall screensavers don't just install themselves.
Actually they do if you surf to the "wrong" sites with the default IE settings for security and the right (wrong) user rights....
Sort of good they fixed it... (Score:2)
However by fixing it, it would seem to the average Joe an admittance that it was a bug in their software. This isn't the case in the least bit. I remember the old slashdot story and the trolls were out that day. Google desktop was given as an example of one of the dozens, if not thousands of various web based programs affected by this IE bug. Make no mistakes about it, this was an IE bug.
T
Re:Sort of good they fixed it... (Score:3, Insightful)
The thing that needs to really be studied is the openness with which a vendor accpets that there is a flaw, and how quickly they solve said flaw.
Here, Google, whether partially, fully, or not at all at fault, has with expedience solved an issue that had the potential to affect their customers. Code is rarely free from bugs. An active de
Re:Sort of good they fixed it... (Score:2)
Ethical? (Re:Sort of good they fixed it...) (Score:3, Insightful)
I've been as much a Google fanboy as anyone--Gmail, Google search on my Web sites and built in to my Web browser, AdSense, Blogger. Except that Blogger, owned by Google, has deleted my account [slashdot.org] with no discussion and no appeal.
I think the "not evil" ethical standards may be slipping just a bit.
If they can fix stuff at their end... that's cool! (Score:5, Insightful)
Re:If they can fix stuff at their end... that's co (Score:2)
I disagree. Having this ability encourages software companies to release buggy and unfinished software before adequate testing is done.
Re:If they can fix stuff at their end... that's co (Score:3, Insightful)
Re:If they can fix stuff at their end... that's co (Score:2)
I don't accept situations like that as inevitable.
Bill: "Life sucks."
Ted: "Then fucking do something about it."
Re:If they can fix stuff at their end... that's co (Score:2)
On the opposite side of the same token, it will make security breaches at the Web Application level much more dangerous.
Re:If they can fix stuff at their end... that's co (Score:2)
Oh. I didn't think so.
Re:If they can fix stuff at their end... that's co (Score:2)
-molo
Re:If they can fix stuff at their end... that's co (Score:3, Funny)
The problem is solved from your end.
Credibility? (Score:5, Funny)
I question Mr. MacDonald's credibility. If this is the same gentleman I'm thinking of, he's an older man who has a farm...or at least had one.
Re:Credibility? (Score:3, Funny)
I thought that song was great at one point in my life
Re:Credibility? (Score:3, Funny)
Indeed (Score:5, Funny)
Re:Indeed (Score:5, Funny)
Re:Indeed (Score:2)
Re:Indeed (Score:2)
Re:Credibility? (Score:2)
Misleading title (Score:4, Informative)
Granted, it does make it sound less like news... but I suppose it's because it isn't, really. You don't see stories like "Adobe fixes Photoshop bug", "KDE team fixes Konqueror bug", etc... since of course that's just part of the daily life in development.
Responsibilty. (Score:5, Insightful)
Nope. Object-orientated programming. If the api documentation says that something should operate in a certain way and it does not then by fixing the problem on your side of things it weakens encapsulation of the function and makes it easier for future bugs to accumulate as the totality of code slowly turns to spaghetti.
Re:Responsibilty. (Score:3, Insightful)
Re:Responsibilty. (Score:3, Interesting)
Sounds like Windows development (Score:3, Interesting)
Re:Sounds like Windows development (Score:2)
Re:Misleading title (Score:5, Informative)
Not really. The flaw is in IE and Google's use of CSS exposed it to their users. They were able to change their use of CSS to work around the exploit, but the exploit still remains in IE. Even Microsoft admits that.
Re:Misleading title (Score:3, Insightful)
I see. In that case, that's working around the bug, not fixing it. If I said "yesterday I was coding when I stumbled in a Glibc bug -- it took me a while but I fixed it" you'd probably infer that I actually went into Glibc's code and corrected the problem. I understand now how calling it a "Googl
Re:Misleading title (Score:2)
Re:Misleading title (Score:3, Informative)
No, because it was not a bug in Google Desktop but a bug in IE that allowed the abuse of the Google Desktop software (and others, BTW).
Google changed part of their server software to remove the ability to use GDesktop the way it was used, but the flaw in MSIE is still there...
"Raises questions"? (Score:5, Insightful)
Re:"Raises questions"? (Score:2)
This maybe unfortunate (Score:3, Interesting)
Mod parent up! (Score:2)
Standards?!? (Score:2, Funny)
That's when I realized this was an article by 'The Onion'.
I don't think Google 'patched' the vulnerability (Score:3, Informative)
Ok everyone.... (Score:5, Informative)
First of all, Google did not fix an IE bug. All they did is make their own software a bit more tight in security, so that *they* are not suceptible to the IE bug. It does not *fix* it.
Second of all, the bug was *not* in Google Desktop, it *is* an IE bug, it just happens that people who use Google Desktop are vulnerable to it since it embeds IE.
But *ANY* app that embeds IE is (and remains) vulnerable, including many other pieces of software. For example, for all you poker players, if you have an account a UltimateBet [ultimatebet.com], you *are* vulnerable to ths bug, and in theory someone could use it to steal your account information, which is very dangerous, since they may be able th initate withdraws from your account as well.
This is just the tip of the iceburgm there are literally hundreds of apps that embed the IE engine for rendering. All are at risk.
Re:Ok everyone.... (Score:3, Insightful)
Google, of all organisations, should know better than to trust IE for anything.
Would it be so hard for them to include a safer rendering engine? Gecko's good. KHTML's good. Both are free. Couldn't they have used those instead? Then if there were any bugs discovered, Google (having the source code) could fix 'em, rather than having to implement
Re:Ok everyone.... (Score:3, Insightful)
Re:Ok everyone.... (Score:3, Informative)
Re:Ok everyone.... (Score:2)
Google Desktop does not embed or include any browser or rendering engine, it is a local http-server that can be accessed using any browser, and it launches your default browser.
p.
Re:Ok everyone.... (Score:3, Informative)
Get rid of embedded IE (Score:3, Informative)
Re:Ok everyone.... (Score:2)
You're 1/2 right (Score:4, Informative)
But parts of the Sidebar component are rendered using an IE rendering engine. It is simple to verify if you check the references in the EXE and DLLs.
No, *you* RTFA (Score:3, Informative)
All the stuff you are describing is just details around how to use this exploit to get information from Google Desktop. But you can easily do the same thing to exploit any service who uses an embedded IE component to render data from a server, be it internal or external.
Take m
Google Free Operating System is needed (Score:2)
I will be surfing over to http://labs.google.com/ [google.com] just in case.
Re:Google Free Operating System is needed (Score:2)
What about the IE vulnerability? (Score:5, Interesting)
What standards would those be? (Score:5, Insightful)
From CIO Today: The incident does raise important questions about Google as a desktop software vendor and its plans for rolling out future security fixes, said MacDonald.
"Since Google is providing end-user software, it must be held to the same standards that you would hold other desktop software vendors to," he said.
Standards? What standards would those be? Last I checked, most software manufacturers are sending out buggy copies of their code hoping you won't notice, patching it up continuously, then going ahead and doing it repeatedly. And let's not forget that Microsoft is the king of them all!
And exactly how are we to hold them to these "standards"? So many people use Microsoft routinely that they have the lion's share of the market, and their competitors are left with the spoils. And while you may not like MS, many of their programs work just well enough that you believe you've got a decent, everday product. Of course they break down, and people scream and rant, but in the end what do they do? Do they immediately switch to something else? No! They patch up their flawed software and keep the status quo.
It's a classic case of addiction, a lot like gambling but in reverse. You use the software every day and most days it works. The one time it doesn't, you fret, but because you restart it or patch it and it works, you go right back to it, rather than exploring alternatives. And Microsoft counts on this. That's why they dominate - they have everybody "addicted" to their software.
Re:What standards would those be? (Score:2)
Of course, some of them dodge the issue by labelling everything "BETA".
Re:What standards would those be? (Score:2)
That's not like addiction. That's like every other human experience involving things that break, which would be, basically, everything.
CYA (Score:2)
This is news, but it's not particularly unusual. When you are vulnerable to an attack, you take steps to remove the vulnerability using resources under your control.
Nothing to see here folks, move along.
Re:CYA (Score:2)
Microsoft makes a lot of stupid decisions, probably because of organizational inefficencies/rot. Google probably will eventually too, but they haven't had time to grow into that phase of business yet. Maybe they are different enough to avoid it, but that is the fate of most very large companies.
An analogy for the comprehension-deficient... (Score:5, Insightful)
Jane's car has a faulty parking brake.
Dick parks, engages the brake, but the car rolls away.
Dick stops parking on hills.
Important Points
Jane did not fix the parking brake
Dick did not fix the parking brake, but he no longer uses it.
Other drivers may or may not be aware of the broken parking brake.
The potential is still there for the car to roll away.
Irony (Score:2, Interesting)
Don't get me wrong. Google issued a quick (and relatively quiet) fix to cover their butts and should be gi
Pointing Out The Obvious (Score:2)
I wouldn't be surprised if google has a "Let's Patch our former employer tuesday!" party each week.
Misleading Title (Score:4, Insightful)
The IE bug can still affect other software.
How did they fix it w/out updating Google Desktop? (Score:2, Interesting)
Re:How did they fix it w/out updating Google Deskt (Score:3, Informative)
--
Q
Clearing up some of the confusion (Score:5, Informative)
The bug I found is in Microsoft Internet Explorer and not in Google Desktop. This bug remains in the browser and it is in no way fixed. This bug by itself is a pretty serious one and allows for exploitation of many sites that are not Google related.
My proof of concept code exploited Google Desktop to retrieve private information from a local machine. In order to do that I used the IE bug twice. First I used it on one of Google's sites in order to get a valid key so I can access the local web server that is Google Desktop's interface. The second time was to execute a query on the GDS server and retrieve the results.
Google basically found a quick hack that nullifies the first portion of the exploit, getting the valid key. They added the following piece of HTML code to their sites, right before the "Desktop" link is revealed: "<!--"/*"/*-->". This makes the IE CSS parser think the rest of the page is a comment so the link won't be visible while trying to read the CSS text.
The bug in IE remains at large. And GDS itself is still exploitable. If somebody found an XSS hole in one of Google's sites, he would be able to retrive the GDS key and then use the second portion of the exploit to retrieve local results.
As I said in my original article, this is a serious bug and there's no simple solution for it, at least until IE is fixed.
Matan
"Slashdot fixes summary bug?" (Score:2)
My reply on their site (Score:3, Insightful)
This article appears to be quite confused. In some way, it appears to point at google and claim somehow that the vulnerability was google's fault. Phrases like "Google Fixes Desktop Search Loophole" and "Since Google is providing end-user software, it must be held to the same standards that you would hold other desktop software vendors to" strongly imply this. In other parts the article is very explicit that the problem is an IE vulnerability that Microsoft hasn't patched.
So, which is it? Is google doing Microsoft a favor by avoiding the use of a feature that Microsoft flubbed? Or did google do something wrong in the first place? And precisely what standards are other makers of desktop software held to? The industry seems to almost gleefully accept an endless parade of the most egregious bugs from these vendors (Microsoft in particular). So, it seems that it would be meaningless to hold google to the same standard unless the complaint is that they have too few bugs.
Note that I have never worked for google or Microsoft.
Another annoyance is this sentence: "Does the researcher think he has really contributed to the security of Internet users worldwide by going public with details of the problem when no fix is available?" In the absence of any other data, that question can't be answered. If a vulnerability goes for longer than a month without the vendor fixing it, then I think a responsible security researcher has a duty to disclose the vulnerability so that people can protect themselves from it.
There is a fine balance to be struck. And as a rule, it is always a courtesy for a security research to disclose a vulnerability first to a vendor, and secondly to the net at large. It is never a requirement. If a vendor abuses the courtesy by not bothering to fix the bug, the researcher has every right (and indeed, a duty) to present the information to the public. You can be sure that people who are much more shadowy than the security researcher looking for a bit of acclaim have a good chance of already knowing about the bug, and are quietly exploiting it for themselves.
All in all, I find your article to be both too simplistic in its treatment of various issues, and confused and muddled about exactly where responsibility lies for various problems. You should be able to do better. You call yourselves 'CIO Today', and the average IT worker's biggest complaint about their bosses is how ill-informed their bosses are about technology while being absolutely certain that they know better than their employees. Perhaps this article points to the reason why.
Note that I have never worked for either Microsoft or google.
Oh Boo Hoo (Score:2)
Re:The bug was Google's... (Score:4, Informative)
Re:Suggested title (Score:3, Insightful)
Truth in reporting and all that fine stuff.
Re:Suggested title (Score:2)
I don't bother with either the google toolbar or the local ("beagle") search. I fear it would make me too lazy to spend 10 minutes once a week to impose some organisation to my files.
Its like when my sister can't find anything after clickig throught eh whole "My Documents" crapfest. I tell her - make a directory outside of all that crap, call it some meaningful name, and stick everything relevant there.
Re:The bug was Google's... (Score:3, Insightful)
Actually, the bug IS originally in the IE code. But Google's Desktop implementation of that code failed to address the security hole. In other words: Microsoft created the security hole and Google Desktop made it dangerous. Who's to blame? MS? Google? Both? None? You decide.
Re:The bug was Google's... (Score:4, Funny)
George W. Bush, clearly.
Re:The bug was Google's... (Score:2)
It's a straightforward use of zeugma [virtualsalt.com], a very common rhetorical device which (in this instance) links two direct objects of the same verb together without having to repeat the subject and verb.
Here is it with the implied subject and verb repeated in square brackets:
"I DO support open source, but [I do support] no p2p."
"I DO enjoy p0rn, but [I do enjoy]
Re:The bug was Google's... (Score:2)
What you're objecting to is a question of style, not grammar. "I support no p2p" is stylistically a tad archaic or overly formal in style, but perfectly normal grammar.
You are proposing an alternative (and equally valid) zeugma: "I DO support open source, but [I do] not [support] p2p." This is decidedly more contemporary and more colloquial, but it is not any more (or less) grammatically correct.
Re:The bug was Google's... (Score:5, Informative)
Re:The bug was Google's... (Score:3, Informative)
Re:The bug was Google's... (Score:4, Insightful)
Re:The bug was Google's... (Score:3, Insightful)
Re:Yay! (Score:2)
(See above already...)
Re:Yay! (Score:2)
Re:What about MS? (Score:2)
IE7 will not be subject to this bug.
IE7 will be included with Vista.
Vista is planned for 2006 and will be released in 2007.
Re:I'm a bit confused (Score:2)
Re:I'm a bit confused (Score:2)
Re:E_IEIO (Score:2, Funny)
Would that be "Old" MacDonald?
Re:Google (Score:2)
Re:Excuse me, but It's really Google's Fault (Score:3, Informative)
What would you to if your program used libfoo, and libfoo turns out to have a security vulnerability in one of the functions you use? You either update to a new version of libfoo, or you try to restruc
Re:Without Accepting Blame? (Score:2)
They complain when they visit a site using perfectly valid HTML 4.01 Strict and IE's screwy box model messes up the layout. Of course it