A day after researchers hacked Chrome and Firefox at the Pwn2Own contest, Google and Mozilla patched their browsers Thursday.
The contest also wound down yesterday after hackers had earned a record $480,000 over two days.
The update to Chrome 25 came about 24 hours after two researchers from U.K. firm MWR InfoSecurity exploited multiple bugs in the browser and Windows 7. In exchange for their attack code and vulnerabilities, Nils -- a German who goes only by his first name -- and Jon Butler were awarded $100,000 by Pwn2Own organizer HP TippingPoint and its Zero Day Initiative (ZDI) bug bounty program.
The quick turn-around nearly matched last year's, when Google patched several Chrome vulnerabilities in under 24 hours after researchers unveiled them at a company-sponsored contest.
Mozilla also patched its Firefox browser on Thursday, closing a hole unveiled by a team from Vupen, a French vulnerability research and exploit-selling company. The team's exploit resulted in a cash prize of $60,000, the laptop used to host Firefox and other fringe benefits.
"We received the technical details on Wednesday evening and within less than 24 hours diagnosed the issue, built a patch, validated the fix and the resulting builds, and deployed the patch to users," said Michael Coates, Mozilla's director of security assurance, in a Thursday blog.
Mozilla had been expecting to patch Firefox, and had prepped for what it calls a "chemspill," or emergency update, before Pwn2Own began.
Firefox 19.0.2, like Chrome 25, has already been pushed to users, most of whom receive it automatically through the browser's in-the-background update mechanism.
The other browser hacked Wednesday at Pwn2Own, Microsoft's Internet Explorer 10 (IE10), has not yet been patched. It's possible, but very unlikely given Microsoft's practices, that a fix will be included in March 12's Patch Tuesday.
On Twitter, Vupen's CEO and head of research, Chaouki Bekrar, said that the exploit his team deployed works against IE10 both on the "classic" desktop in Windows 8 as well as the browser for the tile-based user interface (UI) dubbed "Modern" by Microsoft but still referred to as "Metro" by most outsiders.
On Thursday, Pwn2Own continued with the Vupen team researchers successfully exploiting the Adobe Flash Player browser plug-in. George Hotz, a 23-year-old best known for "jailbreaking" the iPhone and the Sony PlayStation 3 -- and now being sued by Sony for the latter -- later brought down Adobe Reader. Vupen and Hotz each received $70,000 for their Adobe vulnerabilities and hacks.
Oracle's Java was also hacked yesterday by Ben Murphy, making a total of four exploits of the under-assault software that's plagued users with a rash of "out-of-band," or emergency, updates this year. Murphy, like each of the others who cracked Java, earned $20,000.
Pwn2Own's total award payout for the two days was $480,000, a record for the contest, which is now in its eighth year. The Vupen team took home over half of that, $250,000, for its exploits of IE10, Firefox, Flash and Java.
But Google's Pwnium 3, which also ran Thursday at CanSecWest, the same Vancouver, British Columbia security conference that hosted Pwn2Own, came up empty-handed.
"Pwnium 3 has completed and we did not receive any winning entries," a Google spokeswoman said in an email late Thursday. "We are evaluating some work that may qualify as partial credit."
Pwnium had attracted pre-contest attention for its large awards -- up to $150,000 for each hack, with Google committing to a maximum payout of as much as $3.14 million -- and its focus on Chrome OS, the browser-based operating system that powers laptops such as the $249 Samsung Chromebook and Google's own $1,299 Chromebook Pixel.
ZDI called an end to the contest Thursday, even though no researcher had attempted to take down the one remaining target, Apple's Safari browser running on OS X Mountain Lion.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is firstname.lastname@example.org.