These forums have been archived and are now read-only.

The new forums are live and can be found at https://forums.eveonline.com/

Issues, Workarounds & Localization

 
  • Topic is locked indefinitely.
 

AVG AntiVirus Identity Protection issue with ccpBrowser.exe

Author
Jin Rot'hani
Jin-Tonic
#1 - 2013-05-23 15:12:38 UTC
Hi,

after yesterdays patch i couldn't use the ingame browser anymore because my AVG AntiVirus free (ver. 2013.0.3343 / virus db: 3184/6349 22.5.2013) Identity Protection module moved the ccpBrowser.exe into quarantine. I had to undo this for each client installation and create an exception for each ccpBrowser.exe

the same happened with the following sisi launcher: {sisi client path}\launcher\appdata\EVE_Online_Launcher-2.1.539169.win32\launcher.exe

So maybe you want to get in contact with AVG to sort this out or tell me that i am using a malicious ccp webbrowser now Shocked
xarjin
Galactic Deep Space Industries
Brave Collective
#2 - 2013-05-25 18:44:17 UTC  |  Edited by: xarjin
Part of this could be as a result of the in game browser being vulnerable to hundreds of not thousands of chrome exploits given it uses chromium version 3.

IGB badly needs an update to address security issues.

http://www.reddit.com/r/Eve/comments/18osz9/i_was_not_successful_just_posting_on_the_forums/

https://forums.eveonline.com/default.aspx?g=posts&t=205388

The severity of the problem at hand here is there is no single remotely vulnerable exploit if the IGB is actually as old as chrome 3.x

there is hundreds to tens of thousands of them google has patched and they are well documented on the chromium bug tracker, securityfocus.com and likely dozens of other internet security advisory websites.


Google Chrome Prior to 24.0.1312.56 Multiple Security Vulnerabilities


there's at least half a dozen script kiddie tutorials on how to hack chrome on youtube also.

also this security bulliten should serve as an eye opening concern. The denial of service exploit previously used as an example is far less of an issue that remote code execution exploits. Since the IGB runs in it's own process anyine usng IGB that potentially visits a malicious website is vulnerable to remotely having their computer hyjacked by a trojan or becoming the victim of identity theft,


http://msisac.cisecurity.org/advisories/2013/2013-053.cfm

MS-ISAC ADVISORY NUMBER:
2013-053

DATE(S) ISSUED:
05/21/2013

SUBJECT:
Multiple Google Chrome Vulnerabilities Could Allow for Remote Code Execution
OVERVIEW:

Multiple vulnerabilities have been discovered in Google Chrome that could allow remote code execution, bypass of security restrictions, or cause denial-of-service conditions. Google Chrome is a web browser used to access the Internet. Details are not currently available that depict accurate attack scenarios, but it is believed that some of the vulnerabilities can be exploited if a user visits, or is redirected to a specially crafted web page.

Successful exploitation of these vulnerabilities may result in either an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

SYSTEMS AFFECTED:

Google Chrome for Windows, Mac and Linux versions prior to 27.0.1453.93

RISK:

Government:

Large and medium government entities: High
Small government entities: High

Businesses:

Large and medium business entities: High
Small business entities: High

Home users: High