As most of the internet users, I am a heavy Chrome user while surfing the world of internet. But while this surfing I came along an interesting news from MWR Labs which work in security research activities. They demonstrated a full sandbox bypass exploit against the latest stable version of the Google Chrome browser at the annual Pwn2Own competition at the CanSecWest conference in Vancouver. The researchers from MWR labs showed their hack which took a fully patched version of Google Chrome browser, hacked it, and then took control of Windows 7. They explained:
By visiting a malicious webpage, it was possible to exploit a vulnerability which allowed us to gain code execution in the context of the sandboxed renderer process. We also used a kernel vulnerability in the underlying operating system in order to gain elevated privileges and to execute arbitrary commands outside of the sandbox with system privileges.
According to MWR InfoSecurity managing director Ian Shaw:
The reason Chrome was chosen as the target for the demonstration is to encourage understanding, as a security breach of this nature could expose millions of users to serious risk.
MWR Labs decided to share the holes with the vendors so that they can be patched and didn’t provide specifics on the code it exploited to take control over Windows 7.
So, here is an opportunity for you to exploit Google Chrome browser vulnerability if you can, before they fix it in upcoming updates.
Source: http://labs.mwrinfosecurity.com/blog/2013/03/06/pwn2own-at-cansecwest-2013/