Google patches Chrome days before hacking contest
Only browser predicted to survive Pwn2Own gets 11 fixes
The update to Chrome 18.104.22.1686 fixes six flaws rated "high," the second-most-severe ranking in Google's four-step threat system; plugs three "medium" holes; and quashes two "low" bugs.
Danish vulnerability tracker Secunia rated the update as "highly critical."
Although Google typically hides technical details of the most serious vulnerabilities when it issues an update -- it blocks bug tracker entries to prevent attackers from using the information -- all of the 11 bugs are behind the wall this time.
"The referenced bugs may be kept private until a majority of our users are up to date with the fix," explained Orit Mazor, a technical program manager with the Chrome team, in a blog entry Wednesday.
A bug in WebKit, the open-source browser engine that powers Chrome as well as Safari, earned researcher Sergey Glazunov a check for $1,337, the maximum Google pays for vulnerabilities as part of a bounty program that debuted last January. Most flaws earn their finders just $500, but "particularly severe or particularly clever" bugs reap rewards of $1,337 each. The amount is a reference to "leet," a kind of geek-speak used by some researchers; there, "leet" is rendered as "1337."
Other vulnerabilities were credited to Mark Dowd, a noted browser and OS vulnerability researcher who is working under contract for Google; Robert "RSnake" Hansen, CEO of SecTheory; and Aki Helin of OUSPG (Oulu University Secure Programming Group), Oulu University in Finland.
Altogether, Google paid out $3,337 in bounties for the bugs it patched Wednesday.
Only the Windows "stable" channel -- a term Google uses in place of "final" -- was patched; the Mac and Linux versions of Chrome have not yet left the "beta" channel.
Google added several non-security features to Wednesday's update, including integrated language translation and new private browsing settings, that had made their way into the beta earlier this month.
Chrome is the second browser to be patched in seven days. On March 11, Apple fixed 16 flaws in Safari. Both browsers' updates were timely: Starting next Wednesday, Chrome, Safari, Microsoft's Internet Explorer 8 (IE8) and Mozilla's Firefox will go head-to-head with an unknown number of hackers who will try to exploit unpatched vulnerabilities and win $40,000 in cash at Pwn2Own, the annual contest sponsored by 3Com's TippingPoint. On Thursday, Aaron Portnoy, a security research team lead at TippingPoint and the organizer of this year's Pwn2Own, predicted that Safari would fall to attack on the second of the contest's three days, while Chrome would be the sole survivor.
The last time Google patched the stable build of Chrome for Windows was in late January.
Chrome is now the third-most-used browser on the planet, having grabbed the No. 3 spot from Safari in December 2009, and as of last month, accounted for approximately 6% of all browsers in use, according to Web measurement vendor NetApplications.com.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!