GoogHOle Exploits GMail, Picasa and 200K Other Sites 167
Giorgio Maone writes "Multiple Google-targeted exploits disclosed in the past 3 days could compromise your GMail account, steal your pictures from Picasa or impersonate you on almost 200,000 big sites which outsourced their search engines (vulnerabilities included in the price). If even Google, a very reactive company when web security matters, does face this kind of problems, how serious is the threat and what can you do, as a "normal" web user, to protect yourself?"
The real question: (Score:4, Funny)
Re: (Score:1)
I know! If Microsoft hadn't created a platform that became popular nobody would be using computers, so there wouldn't be users to exploit!
Re: (Score:3, Interesting)
Re: (Score:2, Funny)
Re: (Score:1, Funny)
Re: (Score:3, Insightful)
Re:The real question: (Score:5, Interesting)
If you've read our previous post Say Cheese! then you know that Google's Picasa registers the picasa:// URI in the Windows registry and it is possible to abuse this registered URI through a Cross-Site Scripting exposure to steal a victim's images.
So that's a windows only exploit?
We could not possibly blame that on windows.
Re: (Score:2, Insightful)
I'd guess not. Picasa on Linux is a Wine application. Wine, of necessity, has a (yechhh) Registry and Windows API calls to tinker with it. So a registry based attack on the Google web site might very well stand about the same chance as any other complex software under Wine on Linux. Might work, might not. Again, that's a guess. Like 99% of the other posts on Slashdot, this one isn't based on actual knowledge or anything like that.
Re: (Score:2)
Wine, of necessity, has a (yechhh) Registry
Yeah, registry databases [gnome.org] suck. Good thing they're only found on Windows ...
...
As regards your initial assumption, though - Picasa for linux uses a modified WINE environment, not your standard WINE installation. This means that the registry entries are in ~/.picasa/ and inaccessible by normal WINE applications. So unless you've configured your system to use the Picasa variant of WINE as standard, you're probably safe enough
Re:The real question: (Score:4, Insightful)
That has absolutely nothing to do with Windows. It's poor design in a Windows/WINE-only application.
Re: (Score:2)
But didn't the waterbed look good?
M$ is so lazy on security, it makes security (Score:1, Flamebait)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Easy to blame M$ (Score:5, Interesting)
Let's be honest, exploitable applications are OS independent. Though I guess honesty never really comes into it with you, hmm?
Re: (Score:3, Insightful)
Re: (Score:2)
As for your comment, yes, I understand Windows is less secure (for one reason or another) than other options, but to blame application-related holes on them is completely wide of the mark and he's aware of it
Re: (Score:2)
I submit it is not - the quicker you stop gaming Slashdot the better for everyone.
Re: (Score:3, Insightful)
Re: (Score:2)
PS. from an open source point of view it would be the "great technicolour hope", open source, multi cultural, multi racial, multi discipline by default.
Nothing... (Score:4, Insightful)
Re:Nothing... (Score:4, Insightful)
Well, you can certainly stop using the apps... It's the problem of a user becoming too invested in any one thing (OS, DB, etc.). Whenever you become a pundit, a die-heard fan, or even just a casual, everyday user, you buy the whole package, bugs and all. You not only accept that an app proves useful to you, but that it will contain flaws that may prove problematic. Everyone seems to accept that because it is Google, they write perfect code. No way. The quality of code today is such that flaws such as these are inevitable. This doesn't make Google bad, stupid, or irresponsible; it's just part of the business. They will fix these things and life will go on.
Re: (Score:1, Insightful)
Because it isn't secure. Even a little bit. It only takes one cracker to find a way in and all your data is no longer secure and there is nothing you can do about it!
Here's me being all old fashioned and actually taking control of my own data. Silly
Re: (Score:2, Insightful)
Re: (Score:2)
PGP is about the only way to have safe communications. Not perfect, you have to be careful with keys and everything else, but at least you will never be vulnerable to a script-based attack. There is no automatic way of stealing your PGP keys and passphrases, simply because very few people use it and it's so unstandardized that no one cares.
Re: (Score:2)
Re:Nothing... (Score:5, Insightful)
However, anything I accept for free, anything where there isn't some sort of agreed contract between my and the supplier, then caveat emptor (pun intended)
Re:Nothing... (Score:5, Insightful)
Flexcar/Zipcar work that way wonderfully! (Score:3, Insightful)
Re: (Score:2)
Trust nobody! (Score:5, Insightful)
And if you do it yourself, you can be sure that the security will not be higher than your own skill set.
If you want to trust nobody, you might as well retreat to am isolated island somewhere, as you will be unable to function in a society. The key to functioning in a society isn't distrust, but to to be able to judge who to trust and who not to. Which is quite annoyingly mostly a social rather than a technical skill.
----
I personally trust the people at Google more than I trust the people and products responsible for our internal mail solution (which is also available as web mail). Especially with regards to competence (as opposed to integrity). So I would love for us to switch.
Re: (Score:2)
Unless you fluke it. Don't laugh, it's possible.
Re: (Score:2)
Not so fast there....
If you're hosting mail/servers in-house, the people running them have responsibility to one company, if they're directly employed. Contract that to Google, which has hundreds of millions of customers. Losing one or two isn't
Re: (Score:2, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
The only thing is that it ends up costing me in ISP price. Most of the net has gravitated toward the position
Not really clear (Score:3, Interesting)
How do I know if I'm vulnerable?
Can I do anything to protect myself?
If you run Firefox, install NoScript plugin (Score:5, Informative)
Re: (Score:2)
I wonder if these sites will show up in the "warning, this site may be nasty..." messages you sometimes get when browsing to a site via Google search...pretty useless IMHO, 'blacklists' go out of date so fast...
Re: (Score:2)
Re: (Score:2)
Re:If you run Firefox, install NoScript plugin (Score:5, Interesting)
Since Firefox users like to push forward NoScript a lot as some safety precaution (I run it for 2 months, and finally got fed up with enabling virtually any site I visit, so it operates, what's the point), I read a very interesting article about the embeddable nature of IE.
You see, if Firefox can play WMP files on your machine (Windows machine) then every time you open a page (or video) in Firefox you potentially open IE, since WMP can open pages directly inside, and it uses IE regardless of your preferences.
Similar situation occurs with IM-s like Skype and ICQ.
As another commenter said above, security is illusion. Pure and simple.
Re: (Score:2)
Is it completely in their hands?
They own the XSS code that has the vulnerability that is being exploited. Even programming that is outsourced is usually wholly owned by the outsourcing parent. To answer your question: yes, it is completely in their hands.
How do I know if I'm vulnerable?
Are you plugged into the interweb? Do you have a Gmail account? Yes and yes? You're vulnerable to this XSS exploit.
Can I do anything to protect myself?
There are no suggestions in TFA or the subsequent articles as to how to protect yourself from this specific exploit. However, there have been a few good recommendations in
Very few details. (Score:5, Interesting)
It would have been nice if they went into some more detail for technical users.
Re: (Score:2)
Well, based on the links that were provided in the many levels of linked blogs (which should have gotten as close to the Russian source as possible rather than the pimped blog listed in the blurb (PAY ATTENTION "EDITORS"), it seems like people have been alerted to this action.
I can't find a single working link in any of the blogs
Re: (Score:1)
Re: (Score:2)
I still need the exact information if I am to make any informed decisions about my browsing habits.
Re: (Score:2, Informative)
If you need to check your mail or use another of the Google suite, close all other tabs/windows and then sign in. Don't do random browsing at the same time for now.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Interesting)
Seriously, stop watering down the term 'slashvertisment'. It's tossed around enough as it is.
Re: (Score:2)
Re: (Score:2)
How to Protect Yourself? (Score:4, Insightful)
AGREE (Score:2)
Safety is an Illusion (Score:5, Insightful)
You'll never be safe.
Complex software designed for diverse interactions will always be vulnerable to some kind of attack, even if it's as simple as someone walking out of a data center with a thumb drive in their pocket. Almost every vulnerability stems from a "feature" implemented to make software easier/flashier/useful. Flexibility and expansiveness carry with them the price of vulnerability, and pretending otherwise is to wear blinders.
Of course developers should do their best to prevent security problems -- but there is only so much that can be done when you also need to implement Really Cool Stuff. Every door you make is a door than can be kicked in, no matter how good your locks. The real world has never offered perfect security because it can't -- why expect engineered items to be safe from all evil?
Treat software and computers with caution, like walking through a major city's downtown at midnight. Sure, it's dangerous at times -- but it can also be exciting. Just don't pretend that danger doesn't exist...
Re: (Score:2)
You'll never be safe.
Good luck.
The point of this post is not that someone -inside- can/cannot exploit our setup, it's that the other 5 billion people on the planet can't get to it. The same cannot be said of GMail.
Re: (Score:2)
Re: (Score:2)
I think the analogy with software and computers is actually pretty good.
Call me paranoid... (Score:5, Interesting)
FTFA:
... but I already use a separate SeaMonkey browser profile for my GMail account (don't want it being associated with my normal Google searches), and access untrusted URLs using another browser running under a different user. As a matter of habit (I do web-based stuff and I'm used to having several different browsers open). Probably not 100% foolproof, but helps me sleep easier at night.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
If "they" were really after me specifically, I'm sure they would. It's more a matter of not having all my stuff associated with the same Google cookie.
Re: (Score:2)
Re: (Score:2)
you should patent that: STMPD (Score:3, Funny)
which is of course a joke, but is a philosophically sound observation: you can't steal the identity of someone whose identity is fluid
Patches (Score:1)
How many work on Linux (Score:2)
Re: (Score:3, Informative)
Re: (Score:2)
this is really bad news (Score:1)
The answer is in the question... (Score:5, Insightful)
There is no way (unless you're writing something with hundreds, rather than thousands of lines of code) that every code path is going to be audited carefully enough to catch every possible bug. Good coding practices aside, programmers are human and make errors. You do your best to catch as many as you can, and that's all you can do. When you're a "consumer" of code, you look for an organization that seems to be doing this and use their stuff. There's no complete, proactive solution to bugs.
The important thing is that you want someone "very reactive." An organization that acknowledges these flaws up-front, publicly announces vulnerabilities with a work-around until they're patched, and then corrects problems in a timely manner. Some companies are more like this than others.
Re: (Score:3, Insightful)
We like to pretend that the internet is some how this brave new world, but it's still built on a physical infrastructure that exists in the real world, and is designed and maintained by people that live in the real world. In the real world, making something 100% secure is not really feasible, so we just do the b
That's only true because... (Score:2)
I've been proposing the following for _years_:
http://www.google.com/search?num=100&hl=en&safe=off&q=%22Tag+to+disable+unwanted+features%22 [google.com]
http://lists.w3.org/Archives/Public/www-html/2002May/0021.html [w3.org]
http://www.mail-archive.com/mozilla-security@mozilla.org/msg01448.html [mail-archive.com]
http://lists.w3.org/Archives/Public/www-html/2007Aug/0008.html [w3.org]
It will help. But I'm no longer going to bother explaining
Re: (Score:2)
I hate it when
Dont use hosted services!!! (Score:3, Insightful)
If you're drinking the google-juice just because it's "cool" or you want to support them because they're "not evil", you're only doing yourself a dis-service.
Keep your email local, dont save your passwords on a public "service", dont keep naked pictures of your girlfriend on your "G-Drive", etc etc etc
Common Sense
Cite, not sight (Score:2)
Close, but not quite.
Sight (v): to acknowledge that you have seen or received a document, as in, 'inwards goods has sighted the receipt'
Cite (v): to quote as a reference or source in an argument, as in, 'I can cite 5,124 open bugs in Microsoft Office to support my case'
How is one protected in this case? (Score:2, Insightful)
For such an attack to be successful, the victim just needs to visit a malicious website while logged in Google, e.g. by following a link from an incoming message
This is something that can pretty much be said about any site where you login, and is really nothing new. If you're logged in someplace on one browser/profile, then anywhere you visit can potentially have the same rights as you on this site. With the prevalence of XSS and CSRF vulnerabilities around the internet these days, I don't consider any site "safe". This doesn't mean I suggest going all tinfoil hat, just be aware of what rights you currently have and take measures to protect the data that co
Contradiction? (Score:2, Redundant)
Google? Very reactive? (Score:2)
Google are among the worst when it comes to being reactive. Example [jibbering.com]:
consider a vending machine (Score:5, Interesting)
now consider the number of hacks you can use to exploit a vending machine (granted many are physical hacks, but you could call that analogous to social engineering hacks involving "real" software)
now, if something as simple and as straightforward as a vending machine can be exploited, then the obvious conclusion is that:
we should not express shock that google can be hacked, but we should express shock that any of us expected it couldn't be hacked
any computer program of sufficient complexity will be hacked. not could be. will be
and the internet is well into the zone of "sufficient complexity"
what to do (Score:3, Insightful)
Turn off client side scripting.
OR
echo "127.0.0.1 google.com" >> etc/hosts
When I first started in web development it was hammered into us that client side scripting MUST degrade gracefully. What ever happened to that rule?
I hate sites locked to "Web2.0" only! For the most part I will not use them. There are only a handful of URL's in my scripting white list, most of them my own sites.
Yes, I use some client scripting, but it degrades properly.
Security Through Obscurity (Score:2)
If they don't have a reason to target you, they probably won't.
Re: (Score:2)
If you think you're secure because you don't think you're important enough to be to be a "target", then you'll probably end up as one.
The Mac Method (Score:2, Interesting)
(1) Download
(2) when I wish to use that app I mount the image and use app from the temporarily mounted image.
(3) When done using app unmount
(4) Profit!
Of course there are quite a few GNU apps on my Mac which were built and installed from source, but I've never had a reason to feel leery of those. All the G-apps and all third party proprietary apps are in ~/noinstall. Always knew that would pa
Re: (Score:2)
Please Mount My File System, Kernel (Score:2)
Boom. Seriously.
Re: (Score:2)
Keep Your Own Secrets (Score:5, Insightful)
The Web would be a lot more secure if my browser had a keyring integrated with my own computer, and I kept my secrets on my own computer under my own control. When challenged by any server for a secret, my browser or other client SW I'm using should pull the secret from the keyring and supply it to the server. That service should let me use a master key from any remote terminal to query my own computer, over my home broadband or wherever I keep the secrets. All by a standard protocol that lets me just fill web forms (and other challenges) as I do now, possibly entering the master key and maybe an additional confirmation challenge to let the 3rd parties communicate, but otherwise just as transparent as just filling in the forms.
If a 3rd party server is going to store my secrets, I want it to be my bank. I don't know why banks haven't gotten into this business already, after well over a decade watching their profits multiply from the Web, along with many risks. Maybe Google will push a key distribution protocol like this in partnership with some banks. That would also finally get Google into the payment business to challenge eBay's PayPal, which I hate precisely because its (mostly unregulated) global Internet bank is a monopoly, and I don't trust PayPal with my secrets. If Google does recover from this crack, they might be solid enough to trust.
Re: (Score:2)
Unfortunately Apple's Keychain won't let me conveniently access my saved passwords if I'm logged in via SSH (it can be done from the command line, but it pops up a GUI confirmation dialog, unless you do that once and then click "Always Allow" for each password you'll want to access later), and there doesn't appear to be a search feature like there is in the GUI (although it shouldn't be hard to write one). But other than
Re: (Score:2)
I'm not talking about just a keychain. You should have been able to tell from my post that I know about the OS/browser tech for "keyrings". And from the message that there's a lot more to what I'm describing than just a master password.
I haven't had my "head buried in the sand", fuck you v
Replace 'Google' with 'Microsoft' (Score:4, Insightful)
You know that there is some truth in what I say.
It looks to me that there are major holes in Google's services, and they need to be called out on it, not given excuses.
Re: (Score:2, Funny)
Re: (Score:2)
Interesting... On stories (the many, many out there) about Microsoft security holes, I always see people posting excuses for Microsoft in the same manner ("There's nothing Microsoft can do", "Other operating systems have bugs too", "It was the user's fault for clicking on the attachment"). I think you've just discovered a natural law of Slashdot...
Re: (Score:2)
What to do (Score:2)
However this is perhaps good for me since I write search engines. One I installed at a big company for 5 year
So what about their web office suite (Score:4, Interesting)
what I WILL do to protect myself... (Score:2, Insightful)
"very *re*active"? (Score:3, Insightful)
Re: (Score:2)