An engineer at Google plus a serial bug discoverer discovers glitches in Chromodo, Malwarebytes and Avastium anti malware browsers.

Serial bug discoverer, Tavis Ormandy is taking care of business once more. In the wake of uncovering bugs and vulnerabilities in AVG and Trend Micro security products, Ormandy has now discovered three issues found in web-browsers offered by security firms Avast, Comodo and Malwarebytes.

Concurring  Ormandy all the bugs are distinctive and can permit a potential hacker access to casualties PC through the three “secure” web browsers offered by these AV (Antivirus) creators packaged with their products.


Amid his exploration, Ormandy discovered that Avastium browser of Avast, which is a fork of Google Chromium, permitted a potential aggressor to “peruse any account on the filesystem by clicking a connection.” Ormandy says that the adventure includes utilizing a custom made JavaScript site page that could sidestep worked in checks and possibly permit a noxious party to peruse emails and cookies.

Ormandy said that he had alerted Avast on December eighth, yet Avast discharged a fixed variant of its Avastium browser just on February third.


At the point when a user launches Comodo browser suite, it replaces user’s Chrome browser establishment with Comodo’s own program called Chromodo. Ormandy expresses that when Chromodo is introduced “all easy routes are supplanted with Chromodo joins and all cookies, settings, and so forth are imported from the Chrome. They likewise seize DNS settings, among other shady practices,” notes Ormandy.

While Chrome works at same origin policy, which guarantees that just scripts from the same site can access from one another, Chromodo impaired that assurance and left users online open to having their private information sniffed by malware loaded sites.

Comodo has said that the issue was not in their browser but rather in an extention. Comodo executive Charles Zinkowski told eWeek that the organization discharged another rendition of the browser without extension on February third, which has settled the issue for all clients.

Anti-Malware browser of Malwarebytes

On account of Malwarebytes, Ormandy observed that its Anti-Malware program wasn’t downloading overhauls (all the updates) safely, which could leave clients open to a man-in-the-middle (aka MITM) attack. An assailant could copy the organization’s implicit checks and run their own particular code on a user’s machine.

Malwarebytes CEO Marcin Kleczynsk expressed in a blogpost that they recognized the bugs discovered by Ormandy and were in “try stage” for the patch. The patch would be discharged in three to four weeks expresses the website.

In the event that you have any of the above programs available on your PC/tablet, ensure you either introduce the most recent form or fix, or utilize an alternate program till the organization issues a patch as if there should arise an occurrence of Malwarebytes.

Image from Flicker

Leave a comment

Your email address will not be published. Required fields are marked *