share_log

Popular Browsers Chrome, Safari, And Firefox Fall Prey To Major 18-Year-Old Security Hole That Allows Hackers To Infiltrate Firewalls: Report

Popular Browsers Chrome, Safari, And Firefox Fall Prey To Major 18-Year-Old Security Hole That Allows Hackers To Infiltrate Firewalls: Report

流行浏览器 Chrome、Safari 和 Firefox 落入重大18年安防漏洞之手,允许黑客渗透防火墙:报告
Benzinga ·  08/08 04:26

A significant security loophole has been exploited in major browsers, including Apple Inc.'s (NASDAQ:AAPL) Safari, Alphabet Inc.'s (NASDAQ:GOOG) (NASDAQ:GOOGL) Google Chrome, and Mozilla's Firefox. This vulnerability, present for nearly two decades, has allowed hackers to infiltrate private networks, even those protected by firewalls.

包括苹果公司(NASDAQ:AAPL)的Safari、Alphabet公司(NASDAQ:GOOG)(NASDAQ:GOOGL)的Google Chrome和Mozilla的Firefox等主流浏览器都存在一个严重的安防-半导体漏洞。这个漏洞已经存在了近20年之久,使黑客能够渗透私有网络,即使是由防火墙保护的网络也无法幸免。

What Happened: The issue stems from the way these browsers process queries to a 0.0.0.0 IP address. These queries are redirected to other IP addresses, including "localhost," a server typically used for testing code in a private setting, reported Forbes.

事件起因:这些浏览器处理到0.0.0.0 IP地址的请求的方式存在安全漏洞。据《福布斯》报道,这些请求将被重定向到其他IP地址,包括“localhost”,这是一个通常用于在私有环境中测试代码的服务器。

Israeli cybersecurity startup Oligo discovered that hackers have been exploiting this vulnerability to gain access to private data. The attack, known as a "0.0.0.0-day" attack, involves luring the target into visiting a seemingly innocuous website that sends a malicious request to access files via 0.0.0.0.

以色列网络安全初创公司Oligo发现黑客一直在利用这个漏洞来获取私人数据。这种袭击被称为“0.0.0.0-day”攻击,它涉及到引诱目标访问一个看起来无害的网站,该网站通过0.0.0.0发送恶意请求以访问文件。

"Developer code and internal messaging are good examples of some of the info that can be accessed right away," stated Avi Lumelsky, an AI security researcher at Oligo.

Oligo的人工智能安全研究员阿维·卢梅尔斯基表示:“开发人员代码和内部消息是可以立即访问的一些信息的良好示例。”

"But more importantly, exploiting 0.0.0.0-day can let the attacker access the internal private network of the victim, opening a wide range of attack vectors," added Lumelsky.

卢梅尔斯基补充说:“更重要的是,利用0.0.0.0-day可以让攻击者访问受害者的内部私有网络,打开了广泛的攻击向量。”

Apple has confirmed to Forbes that it plans to block all attempts by websites to access 0.0.0.0 in the macOS 15 Sequoia beta. Google's Chromium and Chrome security teams are also considering a similar move, according to online posts, the report noted.

苹果已经向《福布斯》确认,它计划在macOS 15 Sequoia beta中阻止所有网站访问0.0.0.0。根据在线文章,《福布斯》报道称,Google的Chromium和Chrome安全团队也正在考虑类似的举措。

Subscribe to the Benzinga Tech Trends newsletter to get all the latest tech developments delivered to your inbox.

订阅Benzinga Tech Trends电子报,获取最新技术动态。

On the other hand, Mozilla has not yet introduced a solution in Firefox, citing concerns that blocking 0.0.0.0 could disrupt servers that use the address as a substitute for localhost.

另一方面,Mozilla尚未在Firefox中引入解决方案,称担心阻止0.0.0.0可能会影响使用该地址作为localhost替代品的服务器。

Apple, Google, and Mozilla did not immediately respond to Benzinga's request for comments.

苹果、Google和Mozilla未立即回复本文章记者的置评请求。

Notably, Microsoft Corp.'s (NASDAQ:MSFT) Windows systems are immune to this attack as the tech giant has blocked 0.0.0.0 on its operating system.

值得注意的是,微软公司(NASDAQ:MSFT)的Windows系统对这种攻击是免疫的,因为这家技术巨头已经在其操作系统上阻止了0.0.0.0。

The researchers are scheduled to present their findings at the DEF CON conference in Las Vegas this weekend.

安全研究人员计划在本周末在拉斯维加斯召开的DEF CON会议上介绍他们的发现。

Why It Matters: The IP address 0.0.0.0 is a non-routable IPv4 address with several uses, primarily as a default or placeholder address.

这个IP地址0.0.0.0是一个不可路由的IPv4地址,有多种用途,主要作为默认地址或占位符地址。

The Internet Engineering Task Force defines the IP address 0.0.0.0 as a reserved, special-purpose address for "this host, this network," according to TechTarget.

根据TechTarget的说法,互联网工程任务组定义IP地址0.0.0.0为“本主机,本网络”保留的专用地址。

Despite its valid address syntax, a client device using it as a source IP address cannot communicate on a network. This makes exploiting this address by hackers a significant concern, as it allows them to breach private networks undetected.

尽管这是一个有效的地址语法,但使用它作为源IP地址的客户端设备无法在网络上通信。这使得黑客利用这个地址成为一个重大的问题,因为它可以让他们不被发现地侵犯私有网络。

Check out more of Benzinga's Consumer Tech coverage by following this link.

请点击此链接查看更多有关Benzinga的消费科技报道。

  • Why Tim Cook Should Be Worried About Google's Recent Antitrust Case Loss
  • 为什么tim cook应该担心谷歌最近的反垄断案败诉

Disclaimer: This content was partially produced with the help of AI tools and was reviewed and published by Benzinga editors.

免责声明:本内容部分使用人工智能工具生成,并经Benzinga编辑审核发布。

Photo courtesy: Unsplash

图片来源:Unsplash

声明:本内容仅用作提供资讯及教育之目的,不构成对任何特定投资或投资策略的推荐或认可。 更多信息
    抢沙发