READ MORE: 9 ‘Star Wars: The Force Awakens’ fun facts you didn’t see in the movie
As gHacks explains, AVG’s extension was always problematic. It changes startup settings that might negatively affect a given user’s experience with the Chrome browser, it’s nearly impossible to change any modified settings without disabling the extension altogether and its privacy policy states that AVG can collect and sell non-identifiable user data to third parties.
But that’s nothing compared to the complaint from Google:
“Apologies for my harsh tone, but I’m really not thrilled about this trash being installed for Chrome users. The extension is so badly broken that I’m not sure whether I should be reporting it to you as a vulnerability, or asking the extension abuse team to investigate if it’s a PuP.
Nevertheless, my concern is that your security software is disabling web security for 9 million Chrome users, apparently so that you can hijack search settings and the new tab page.
There are multiple obvious attacks possible, for example, here is a trivial universal xss in the “navigate” API that can allow any website to execute script in the context of any other domain. For example, attacker.com can read email from mail.google.com, or corp.avg.com, or whatever else.”
AVG released a fix shortly after this report was filed, but Google denied it. It didn’t fix the issue. AVG issued a second update on December 21st, and that one was accepted by Google, but the team has disabled inline installations just in case.
If you have the AVG Web TuneUp extension, you might want to consider another security solution.
This article was originally published on BGR. Read the original article.