The WebSocket service allows connections from any website, and that type of service should check the origin of the calling webpage so only authorized webpages can open a connection. While such crashes can often lead to exploitable security bugs, Ormandy found an even easier way to compromise the software. The first flaw Ormandy found is the ability to crash that server by sending JSON data with incorrect data types. Upon inspecting the Logitech Options app, Ormandy discovered it opened a local WebSocket server that expects JSON messages. The software uses Electron, an open source framework that enables users to develop cross-platform desktop applications in JavaScript, but which has also been subject to serious security vulnerabilities. 1, and none of the issues he had reported were fixed.Īccording to his report, Ormandy tried to reconfigure a button on his Logitech mouse in Windows and learned that, in order to do so, he had to download the 149 MB Logitech Options app. However, it seems the Logitech developers didn't resolve the issue: Ormandy tested the latest version, released on Oct. "They assured me they understood the issues and were planning to add origin checks and type checking," Ormandy wrote on the Project Zero bug tracker. Ormandy contacted Logitech and met with Logitech engineers in September. He published details about the critical vulnerability when Logitech took more than 90 days to address the issue. Tavis Ormandy, vulnerability researcher with Google's Project Zero, found the flaw in the Logitech Options app when he tried to rebind a button on his Logitech mouse.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |