Google patches Gmail message-forwarding flaw

Powered by SC Magazine
 

Google has patched a cross-site request forgery vulnerability in Gmail that could allow the forwarding of messages to a malicious user.

Researcher Petko Petkov of Gnucitizen said Sunday on his organisation's blog that Google had fixed the flaw.

Petkov told SCMagazineUS.com today that Google said no end-users were targeted via the flaw.

“According to them, no users were affected, mainly because no additional details on the issue were released before the fix,” he said.

Petkov released proof-of-concept code for the flaw on Sunday. Last week, he warned other researchers not to disclose details of the issue until Google fixes it, saying the vulnerability is “extremely nasty if you ask me.”

Petkov last week noted that, in the event of an attack, messages would continue to be forwarded to an attacker despite a fix because the filter, created by an exploit, is still present.

Last month, Petkov discovered a flaw in QuickTime and Firefox, as well as a vulnerability in Adobe Reader. Both flaws were quickly fixed by vendors last week.

A representative from the Mountain View, Calif.-based search giant could not be immediately reached for comment today.

US-CERT warned in an advisory updated on Monday that the flaw “may allow a request from an attacker to be interpreted as originating from an authenticated user,” and noted Google's fix.

See original article on SC Magazine US

Copyright © SC Magazine, US edition


Google patches Gmail message-forwarding flaw
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 327

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  56%
 
No
  44%
TOTAL VOTES: 135

Vote