-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
circumstances #2
Comments
I always find it funny when news outlets take a vulnerability so out of proportion ignoring the fact that the attacker need to get access to your computer. |
That's the main question! Even if it does not require installation of malicious app, can the exploit be triggered from javascript that's executed when visiting malicious website? If that's true, is very bad! One way of exploiting this requires 2 steps 1) serving malicious js on public networks that require signin over http(eg. hotels, airports). 2) the attacker, being on the same network, monitors the encrypted traffic of the victim and through malicious js from 1) that still runs in the other tab, execute Gofetch attack to figure out the TLS keys, so it can completely hijack the victim. There are a couple of sidechannel attacks that can be achieved from javascript, see Fantastic Timers and where to find them |
Exactly what I thought, I ve read so much B$ on social media so I though to clear it out I just ask some profis here :) |
In theory the exploit could run on WASM (low-level code in JS), since the exploit would supposedly ignore the sandbox that it's in. But I don't know enough about the low-level stuff to answer that. |
Related: So the question is: "How to disable WASM in Safari" |
So as far as I know, browser vendors and others made timers less precise in an attempted mitigation against such attacks via javascript: It wouldn't make sense for them to reintroduce the attack vector via WASM. I just wonder if similar threading techniques to those mentioned in the gofetch paper could be used to work around the timer limitations in js/wasm. Interesting times. |
@bl4zk0 But as noted on the homepage, Hector Martin found a chicken bit that disables DMP, so it can be patched. |
can this exploid run without installing code on teh target machine? Or how else could that be a danger? please
Or is there still a way to execute arbitary code from remote, wasn't that patched?
The text was updated successfully, but these errors were encountered: