Google squashes 10 Chrome bugs as $100K Pwn2Own hacking prize looms
Also releases Chrome 25 for Apple's iPhone and iPad, promises search improvements
Computerworld - Google today patched 10 vulnerabilities in Chrome, just two days before the start of Pwn2Own, a hacking contest that has $100,000 in prize money waiting for the first researcher to crack the browser.
In an update Monday for the Windows and Linux versions -- Google patched the OS X edition on Friday -- the company fixed 10 flaws, six of them marked as "high," the second-most-serious threat ranking. Of the remaining bugs, three were pegged as "medium" and one as "low."
Today's patches follow a larger batch issued Feb. 21, and further harden Chrome as it faces Pwn2Own, the hacking challenge that kicks off March 6 at the CanSecWest security conference in Vancouver, British Columbia.
Google has contributed money to Pwn2Own's prize pool, which includes a $100,000 award to the first researcher who hacks the current version of Chrome on Windows 7.
Pwn2Own will put a record $560,000 on the line over its three days, with prizes awarded on a sliding scale aligned with the anticipated difficulty of each hack. The first researcher to successfully exploit Internet Explorer 10 (IE10) on Windows 8 will receive $100,000, for example, while the first able to crack Firefox on Windows 7 will get $60,000.
IE9, Safari on OS X, Adobe Flash and Adobe Reader, and Oracle Java will also pose as targets.
Of the 10 vulnerabilities patched today, four were reported by three independent researchers, who received a total of $5,000 from Chrome's bug bounty program. So far this year, Google has paid out $15,500 in bounties.
Other browser makers have also recently patched their software, perhaps with an eye on Pwn2Own.
Three weeks ago, Microsoft updated all versions of IE, including IE9 and IE10 -- both Pwn2Own targets -- with 14 patches. Twelve of those were rated "critical" by Microsoft for IE9, while five were tagged the same for IE10.
On Feb. 19, Mozilla released Firefox 19, patching 13 vulnerabilities, 10 of which were labeled critical.
Also on Monday, Google updated Chrome for Apple's iOS operating system to version 25, matching the moniker of the desktop edition. According to a brief release note, Chrome 25 for iOS will also sport new search features "over the coming days" that show the search string in the browser's "omnibox," Google's term for the address field, and let users refine queries from the search results page.
Chrome for iOS can be downloaded free of charge to an iPhone, iPad or iPod Touch from Apple's App Store.
Chrome for iOS is currently No. 94 on the App Store's iPhone free-app download list, and No. 50 on the corresponding iPad list.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is firstname.lastname@example.org.
- Workarounds to purge search bar from Firefox's new tab page are available
- Mozilla ships Firefox 31, adds search to new tab page
- Microsoft's IE steps back from the brink of irrelevance
- Firefox falters, falls to record low in overall browser share
- Firefox risks user backlash by adding search box to new tab page
- Google unseats Microsoft as the U.S. browser powerhouse
- Safari, Chrome push to mask URLs
- Chrome on Windows champs at the 64-bit
- Google pulls trigger, cripples some Chrome add-ons
- Microsoft shoots to shorten Internet Explorer's long tail
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts