Google patches rare critical vulnerability in Chrome
- 10 March, 2012 01:43
Google has patched a critical Chrome vulnerability disclosed Wednesday at the CanSecWest security conference in Vancouver that can be exploited to escape from a browser's secure sandbox.
Russian security researcher Sergey Glazunov demonstrated a remote code-execution (RCE) exploit against a fully patched version of Chrome on Windows 7 as part of Google's Pwnium contest held at the conference..
Glazunov's exploit leveraged two Chrome vulnerabilities -- one that allows the execution of arbitrary code and one that bypasses the browser's much-touted security sandbox, which normally restricts such exploits.
Remote code-execution vulnerabilities, while very serious, are relatively common in all software products. However, the sandbox escape ones are extremely rare and, according to TippingPoint, which runs the separate Pwn2Own contest at CanSecWest, are worth much more than the US$60,000 Glazunov earned from Google for reporting it.
Both vulnerabilities leveraged by Glazunov's exploit were fixed in Google Chrome 17.0.963.78, which was released on Thursday.
"We had the first successful exploit at Pwnium yesterday, and today we've already rolling out an update to protect our users," said Sundar Pichai, Google's senior vice president for Chrome, on Thursday via his Google+ account. "The team took less than 24 hours from initial report to verification to fix development to getting a fix out."
Because of the Chrome's auto-update feature, users just need to restart their browsers in order to deploy the security fix. Organizations can deploy the important update by using the Google Update for enterprise policy.
Glazunov's was not the only Chrome sandbox escape exploit demoed at CanSecWest. A team of researchers from French security vendor VUPEN presented a similar attack as part of TippingPoint' Pwn2Own contest.
However, the Pwn2Own rules don't require researchers to disclose sandbox-escape vulnerabilities to vendors, primarily because the prize money wouldn't justify their disclosure. This means that there is still one highly critical Chrome vulnerability out there that remains unpatched.
The Chrome security team suspects that it's located in the Flash Player plug-in bundled with the browser by default and not in Chrome's own code. There is no confirmation from VUPEN regarding this theory, but if true, the task of patching the vulnerability would fall with Adobe Systems.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Bug Hunter Hacks Chrome at CanSecWest; Earns Top Reward From Google : PCWorld Business Center
- TippingPoint : DVLabs : Pwn2Own 2012 and Google Pwnium
- Chrome Releases: Chrome Stable Channel Update
- Sundar Pichai - Google+ - We had the first successful exploit at Pwnium yesterday…
- Chrome succumbs to Pwn2Own contest hack - Computerworld
- 2014 Foundations of Pathways | 9 Executive Core Business Competencies
- CMO's Customer Engagement in a Multi-Channel Marketing World
- 5 Ways To Be More Productive At Work
- ERP Selection: Finding the Right Fit
- Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
- OAIC releases privacy impact assessment guide for consultation
- Some Australian businesses 'unlikely' to be ready for Privacy Act changes: survey
- BYOA 'shadow IT' grows in the enterprise: Telsyte
- Cost of a Privacy Act breach could extend to ongoing audits: legal expert
- How Hunter Water is saving $50k a year in software licences
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Leading insurance provider’s desktop virtualization deployment
QBE insurance group met the challenge of swiftly deploying a desktop virtualization solution, after practically outsourcing its entire IT department overnight. Read their story to learn how to allow users a comfortable desktop while ensuring that IT can maintain control.
Best Practices in Data Protection Monitoring
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.
Whitepaper: Preventing Data Loss Takes More Than MDM
You need to secure your BYOD devices—but MDM alone isn't enough to prevent data loss. Read this whitepaper—Data Loss Prevention: When MDM Is Not Enough—to learn how to combat MDM shortcomings. See how to add cross-platform security, implement protection policies, and address risks in consumer apps.