msgbartop
All about Google Chrome & Google Chrome OS
msgbarbottom

30 Jan 12 How to Stop YouTube From Crashing Google Chrome


Users of Google’s Chrome browser have been stuck with a finicky issue as of late: According to reports, some Web surfers are experiencing frequent browser crashes whenever they try to navigate away from a Youtube page.

The crash typically occurs after a Youtube video (viewed on YouTube.com) has fully buffered within the browser and a user goes to close the tab or navigate to another page either by clicking a link on the YouTube page or typing a new address into Chrome’s Omnibar. Chrome locks up completely and forces the user to restart the browser and restore all previous pages – and frantically close the reopened YouTube page before the browser crashes again.

While some users have suggested that the problem’s related to Adobe Flash – specifically, the two allegedly competing Flash .DLL files often listed within a user’s “chrome://plugins” window (type that into the Omnibar to see them) – a Google representative has indicated that the YouTube crash issue isn’t related to Flash versioning.

Or, in other words, performing the much-described trick of disabling one Flash .DLL within the “chrome://plugins” window isn’t going to fix the YouTube crash problem for all users. Uninstalling Flash within Chrome and reinstalling the plugin doesn’t appear to address the problem, nor does switching YouTube over to HTML5 viewing mode protect against future browser crashes.

“Everyone else – We’ve been able to reproduce this now, and are actively working on a fix,” writes Google employee “Toni” on a related Chrome support thread. “It’s not specific to updating Flash or not. Please sit tight while we work on the fix and I’ll update this thread as we know more. Thanks!”

So what can a Chrome user do to keep the browser alive and still get in one’s daily dose of cat videos? It seems that right-clicking on a YouTube video and selecting “Stop Downloading,” even if the video has already loaded fully within the browser window, prevents Chrome from crashing. The problem? It’s tough to remember, especially if you’re just firing up your browser (or a single new tab) to check out a funny link your friend sent you real quick.

Other than that, and a plethora of suggested fixes one can try (to great or little success) within forum threads, it’s going to be a waiting game. Provided the Chrome-YouTube issue is something that Google address within the browser, Chrome should auto-update and pull down the correct fix once Google’s figured out the solution.

For more from David, subscribe to him on Facebook: David Murphy.

For the top stories in tech, follow us on Twitter at @PCMag.

Article source: http://www.pcmag.com/article2/0,2817,2399511,00.asp?kc=PCRSS03069TX1K0001121

Tags: , , ,

30 Jan 12 How to Stop YouTube From Crashing Google Chrome


Users of Google’s Chrome browser have been stuck with a finicky issue as of late: According to reports, some Web surfers are experiencing frequent browser crashes whenever they try to navigate away from a Youtube page.

The crash typically occurs after a Youtube video (viewed on YouTube.com) has fully buffered within the browser and a user goes to close the tab or navigate to another page either by clicking a link on the YouTube page or typing a new address into Chrome’s Omnibar. Chrome locks up completely and forces the user to restart the browser and restore all previous pages – and frantically close the reopened YouTube page before the browser crashes again.

While some users have suggested that the problem’s related to Adobe Flash – specifically, the two allegedly competing Flash .DLL files often listed within a user’s “chrome://plugins” window (type that into the Omnibar to see them) – a Google representative has indicated that the YouTube crash issue isn’t related to Flash versioning.

Or, in other words, performing the much-described trick of disabling one Flash .DLL within the “chrome://plugins” window isn’t going to fix the YouTube crash problem for all users. Uninstalling Flash within Chrome and reinstalling the plugin doesn’t appear to address the problem, nor does switching YouTube over to HTML5 viewing mode protect against future browser crashes.

“Everyone else – We’ve been able to reproduce this now, and are actively working on a fix,” writes Google employee “Toni” on a related Chrome support thread. “It’s not specific to updating Flash or not. Please sit tight while we work on the fix and I’ll update this thread as we know more. Thanks!”

So what can a Chrome user do to keep the browser alive and still get in one’s daily dose of cat videos? It seems that right-clicking on a YouTube video and selecting “Stop Downloading,” even if the video has already loaded fully within the browser window, prevents Chrome from crashing. The problem? It’s tough to remember, especially if you’re just firing up your browser (or a single new tab) to check out a funny link your friend sent you real quick.

Other than that, and a plethora of suggested fixes one can try (to great or little success) within forum threads, it’s going to be a waiting game. Provided the Chrome-YouTube issue is something that Google address within the browser, Chrome should auto-update and pull down the correct fix once Google’s figured out the solution.

For more from David, subscribe to him on Facebook: David Murphy.

For the top stories in tech, follow us on Twitter at @PCMag.

Article source: http://www.pcmag.com/article2/0,2817,2399511,00.asp

Tags: , , ,

26 Oct 11 Chrome Bug No Security Threat, Argues Google


chromeGoogle’s Chrome contains a critical vulnerability that under certain circumstances allows attackers to plant malware on a Windows PC, a security company said last week.

According to Slovenia-based Acros Security, Google would not categorize the bug as a vulnerability, and instead called it a “strange behavior that [they] should consider changing.”

The vulnerability, said Mitja Kolsek, Acros’ CEO, is one of a string in Windows programs that relies on an attack strategy variously dubbed “DLL load hijacking,” “binary planting” and “file planting.”

The attack jumped into public view in August 2010 when HD Moore, the creator of the Metasploit penetration hacking toolkit and chief security officer at Rapid7, found dozens of vulnerable Windows applications. Moore’s report was followed by others, including several from Kolsek and Acros.

Many Windows applications don’t call DLLs, or dynamic link libraries, using a full path name, but instead use only the filename, giving hackers a way to trick an application into loading a malicious file with the same title as a required DLL. If attackers can dupe users into visiting malicious Web sites or remote shared folders, or get them to plug in a USB drive — and in some cases con them into opening a file — they can hijack a PC and plant malware on it.

Microsoft, for instance, has provided 17 security updates in the last 13 months to fix DLL load hijacking problems, most recently earlier this month .

The newest, however, affects Chrome, the browser that — because of its “sandbox” technology that isolates the browser from the rest of the system — most security experts believe is the safest of the top five.

Chrome’s sandbox doesn’t protect against this DLL load hijacking, said Acros in a lengthy write-up of the vulnerability.

The silver linking? Hackers have to have the stars perfectly aligned to exploit the bug, said Acros.

For the vulnerability to be exploited, Chrome must be set to use a search engine other than Google’s, which is, not surprisingly, the default for Google’s browser. Acros confirmed that an attack can be successfully launched against Chrome when users set Yahoo or Bing as the browser’s preferred search site.

The user must have not visited a secure website — one whose URL starts with HTTPS — before the attack begins, added Acros, and must also be duped into trying to load a file and thus have the “Open” dialog box onscreen when the attack initiates.

That was all too much for Google.

bugIn a thread on the Chromium bug tracker a Google developer said, “We’re not treating this as a security bug [because] the preconditions to exploit this are too stretched.”

Later in the thread — started by Kolsek on Sept. 21 when he reported Acros’ findings — the same developer added, “The implausibility of actual exploitation [means] we want to treat this as ‘strange behavior that we should consider changing’ rather than a vulnerability.”

Acros didn’t entirely disagree.

“This is hard to dispute,” Acros said of the required preconditions, and the likelihood hackers would steer for exploits that had a higher probability of succeeding. “[But] as security researchers we consider any ‘feature’ that allows silent downloading of remote code and its execution on user’s computer without warnings a vulnerability.”

Acros raised an interesting question. “How much social engineering is too much?” the company asked in its analysis of the flaw.

That debate isn’t new: Microsoft regularly downgrades the seriousness of vulnerabilities when it decides that “user interaction” — tricking people to do some of an attacker’s job — is involved.

Acros recommended that Chrome users set a secure site, Gmail is one, as their home page to stymie such attacks. While Acros didn’t spell out other options, users can also protect themselves by leaving Google as the browser’s default search engine.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer , on Google+ or subscribe to Gregg’s RSS feed . His e-mail address is gkeizer@computerworld.com .

See more articles by Gregg Keizer .

Read more about security in Computerworld’s Security Topic Center.

Article source: http://www.pcworld.com/article/242549/chrome_bug_no_security_threat_argues_google.html

Tags: , , ,

26 Oct 11 Chrome bug no security threat, argues Google


Computerworld - Google’s Chrome contains a critical vulnerability that under certain circumstances allows attackers to plant malware on a Windows PC, a security company said last week.

According to Slovenia-based Acros Security, Google would not categorize the bug as a vulnerability, and instead called it a “strange behavior that [they] should consider changing.”

The vulnerability, said Mitja Kolsek, Acros’ CEO, is one of a string in Windows programs that relies on an attack strategy variously dubbed “DLL load hijacking,” “binary planting” and “file planting.”

The attack jumped into public view in August 2010 when HD Moore, the creator of the Metasploit penetration hacking toolkit and chief security officer at Rapid7, found dozens of vulnerable Windows applications. Moore’s report was followed by others, including several from Kolsek and Acros.

Many Windows applications don’t call DLLs, or dynamic link libraries, using a full path name, but instead use only the filename, giving hackers a way to trick an application into loading a malicious file with the same title as a required DLL. If attackers can dupe users into visiting malicious Web sites or remote shared folders, or get them to plug in a USB drive — and in some cases con them into opening a file — they can hijack a PC and plant malware on it.

Microsoft, for instance, has provided 17 security updates in the last 13 months to fix DLL load hijacking problems, most recently earlier this month.

The newest, however, affects Chrome, the browser that — because of its “sandbox” technology that isolates the browser from the rest of the system — most security experts believe is the safest of the top five.

Chrome’s sandbox doesn’t protect against this DLL load hijacking, said Acros in a lengthy write-up of the vulnerability.

The silver linking? Hackers have to have the stars perfectly aligned to exploit the bug, said Acros.

For the vulnerability to be exploited, Chrome must be set to use a search engine other than Google’s, which is, not surprisingly, the default for Google’s browser. Acros confirmed that an attack can be successfully launched against Chrome when users set Yahoo or Bing as the browser’s preferred search site.

More: Browser Topic Center

Article source: http://www.computerworld.com/s/article/9221180/Chrome_bug_no_security_threat_argues_Google

Tags: , , ,