Security News > 2021 > March > Google Releases PoC Exploit for Browser-Based Spectre Attack

Google Releases PoC Exploit for Browser-Based Spectre Attack
2021-03-15 11:37

Google last week announced the release of proof-of-concept code designed to exploit the notorious Spectre vulnerability and leak information from web browsers.

In 2019, the Google team responsible for Chrome's V8 JavaScript engine said that the attack can't be mitigated at the software level, arguing that security boundaries in browsers should be aligned with low-level primitives, such as process-based isolation.

To keep their users safe, browser makers have already implemented protections such as Site Isolation, Cross-Origin Read Blocking, and out-of-process iframes, with a variety of security features available for other application developers as well, including Cross-Origin Resource and Cross-Origin Opener Policies, and more.

In order to assess the effectiveness of such mitigations, Google's researchers have released JavaScript PoC code functional across multiple operating systems, architectures, and hardware variants, and which "Confirms the practicality of Spectre exploits against JavaScript engines."

"The demonstration website can leak data at a speed of 1kB/s when running on Chrome 88 on an Intel Skylake CPU. Note that the code will likely require minor modifications to apply to other CPUs or browser versions; however, in our tests the attack was successful on several other processors, including the Apple M1 ARM CPU, without any major changes," Google explains.

In addition to releasing the PoC, Google is making recommendations on how web developers can improve site isolation to deny access to cross-origin resources, thus effectively mitigating Spectre-style hardware attacks, among others.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/fRZF95Bg-ZQ/google-releases-poc-exploit-browser-based-spectre-attack

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Google 102 253 4216 4506 727 9702