{"id":7179,"date":"2017-03-30T12:30:01","date_gmt":"2017-03-30T20:30:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/30\/news-970\/"},"modified":"2017-03-30T12:30:01","modified_gmt":"2017-03-30T20:30:01","slug":"news-970","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/30\/news-970\/","title":{"rendered":"Google patches Chrome bug from fizzled Pwn2Own hack"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/article\/2017\/03\/chromelogo-100714543-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Thu, 30 Mar 2017 12:03:00 -0700<\/strong><\/p>\n<p>Google yesterday updated Chrome to patch several vulnerabilities, including a bug in the browser&#8217;s JavaScript engine that a Chinese team tried to exploit at a recent hacking contest.<\/p>\n<p>The update to version 57.0.2987.133 contained <a href=\"https:\/\/chromereleases.googleblog.com\/2017\/03\/stable-channel-update-for-desktop_29.html\" target=\"_blank\">fixes for five vulnerabilities<\/a>, one marked &#8220;Critical&#8221; &#8212; the most serious rating in Google&#8217;s system &#8212; and the others tagged &#8220;High.&#8221;<\/p>\n<p>Of the four vulnerabilities ranked High, one was attributed to &#8220;Team Sniper,&#8221; one of five groups from Chinese company Tencent Security that participated in this year&#8217;s edition of Pwn2Own, one of the world&#8217;s best-known hacking contests. Pwn2Own ran March 15-17 alongside the CanSecWest conference in Vancouver, British Columbia.<\/p>\n<p>Team Sniper took aim at Chrome on the <a href=\"http:\/\/www.computerworld.com\/article\/3180523\/security\/adobe-reader-edge-safari-and-ubuntu-fall-in-first-day-at-pwn2own.html\">first day of the challenge<\/a>, hoping to grab the $80,000 prize for hacking Google&#8217;s browser. But the Chinese researchers fell short. &#8220;Unfortunately, they could not get their exploit chain working within the allotted timeframe, resulting in a failure,&#8221; said TippingPoint, a division of Trend Micro and Pwn2Own&#8217;s sponsor, <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2017\/3\/15\/the-results-pwn2own-2017-day-one\" target=\"_blank\">at the end of Day 1<\/a>.<\/p>\n<p>Google noted that the bug used by Team Sniper was an &#8220;out-of-bounds memory access [vulnerability] in V8,&#8221; Chrome&#8217;s JavaScript engine. As is Google&#8217;s practice, it did not divulge any other information about the flaw. After several weeks, or even months &#8212; enough time for most users to update the browser &#8212; Google usually lifts the embargo on the bug report and its technical data.<\/p>\n<p>No other individual researcher or team of hackers attempted to crack Chrome at Pwn2Own. Several successful attacks were conducted against other browsers during the contest, however, including five that compromised Microsoft&#8217;s Edge, four that broke Apple&#8217;s Safari and one which hijacked Mozilla&#8217;s Firefox.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3183264\/security\/mozilla-beats-rivals-patches-firefoxs-pwn2own-bug.html\">Mozilla patched the Firefox flaw<\/a> just a day after the vulnerability was exploited at Pwn2Own.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3186686\/web-browsers\/google-patches-chrome-bug-from-fizzled-pwn2own-hack.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/article\/2017\/03\/chromelogo-100714543-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Thu, 30 Mar 2017 12:03:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Google yesterday updated Chrome to patch several vulnerabilities, including a bug in the browser&#8217;s JavaScript engine that a Chinese team tried to exploit at a recent hacking contest.<\/p>\n<p>The update to version 57.0.2987.133 contained <a href=\"https:\/\/chromereleases.googleblog.com\/2017\/03\/stable-channel-update-for-desktop_29.html\" target=\"_blank\">fixes for five vulnerabilities<\/a>, one marked &#8220;Critical&#8221; &#8212; the most serious rating in Google&#8217;s system &#8212; and the others tagged &#8220;High.&#8221;<\/p>\n<p>Of the four vulnerabilities ranked High, one was attributed to &#8220;Team Sniper,&#8221; one of five groups from Chinese company Tencent Security that participated in this year&#8217;s edition of Pwn2Own, one of the world&#8217;s best-known hacking contests. Pwn2Own ran March 15-17 alongside the CanSecWest conference in Vancouver, British Columbia.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3186686\/web-browsers\/google-patches-chrome-bug-from-fizzled-pwn2own-hack.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11072,714,11114],"class_list":["post-7179","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-cybercrime-hacking","tag-security","tag-web-browsers"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7179"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7179\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7179"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}