Researchers: Second Google desktop attack possible

Security experts say Google Desktop is vulnerable

Google’s PC search software is vulnerable to a variation on a little-known web-based attack called anti-DNS (domain name system) pinning, that could give an attacker access to any data indexed by Google Desktop, security researchers say.

This was the second security problem reported within a week for the software. Researchers at Watchfire say they have found a flaw that could allow attackers to read files or run unauthorised software on systems running Google Desktop.

As with Watchfire’s bug, attackers would first need to exploit a cross-site scripting flaw in the website for this latest attack to work. But the consequences could be serious, according to Robert Hansen, the independent security researcher who first reported the attack. “All of the data on a Google desktop can now be siphoned off to an attacker’s machine,” he says.

Cross-site scripting flaws are common web server vulnerabilities that can be exploited to run unauthorised code within the victim’s browser.

Hansen, who is CEO of, did not post proof-of-concept code for his attack, but he says he has “tested every component of it, and it works.” He has posted some details of how Google Desktop data could be compromised on his blog.

Google says it is investigating Hansen’s findings. “In addition, we recently added another layer of security checks to the latest version of Google Desktop to protect users from vulnerabilities related to web search integration in the future,” the company said in a prepared statement.

Anti-DNS pinning is an emerging area of security research, understood by just a handful of researchers, says Jeremiah Grossman, chief technical officer at WhiteHat Security. The variation of this attack described by Hansen manipulates the way the browser works with the internet’s DNS in order to trick the browser into sending information to an attacker’s computer.

“Once you can re-point Google to another IP address, instead of Google getting the traffic the bad guy does,” he says.

Because this type of attack is so difficult to pull off and is poorly understood, it is unlikely to be used by the criminals any time soon, Grossman says. But anti-DNS pinning shouldn’t be ignored, he added. “We should keep our eyes on it in case the bad guys shift gears.”

News of the attack comes as Google is trying to enter the desktop productivity market. Google recently launched a suite of web-based collaboration software, called the Google Apps Premier Edition, which analysts say could become a competitor to Microsoft Office.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags GoogleSecurity IDdesktop attack

Show Comments