Sandbox escape vulnerability disclosed at CanSecWest was patched in Chrome 17.0.963.78 Google has patched a critical Chrome vulnerability disclosed Wednesday at the CanSecWest security conference in Vancouver that can be exploited to escape from a browser’s secure sandbox. Russian security researcher Sergey Glazunov demonstrated a remote code-execution (RCE) exploit against a fully patched version of Chrome on Windows 7 as part of Google’s Pwnium contest held at the conference..Glazunov’s exploit leveraged two Chrome vulnerabilities — one that allows the execution of arbitrary code and one that bypasses the browser’s much-touted security sandbox, which normally restricts such exploits.Remote code-execution vulnerabilities, while very serious, are relatively common in all software products. However, the sandbox escape ones are extremely rare and, according to TippingPoint, which runs the separate Pwn2Own contest at CanSecWest, are worth much more than the US$60,000 Glazunov earned from Google for reporting it. Both vulnerabilities leveraged by Glazunov’s exploit were fixed in Google Chrome 17.0.963.78, which was released on Thursday.“We had the first successful exploit at Pwnium yesterday, and today we’ve already rolling out an update to protect our users,” said Sundar Pichai, Google’s senior vice president for Chrome, on Thursday via his Google+ account. “The team took less than 24 hours from initial report to verification to fix development to getting a fix out.” Because of the Chrome’s auto-update feature, users just need to restart their browsers in order to deploy the security fix. Organizations can deploy the important update by using the Google Update for enterprise policy.Glazunov’s was not the only Chrome sandbox escape exploit demoed at CanSecWest. A team of researchers from French security vendor VUPEN presented a similar attack as part of TippingPoint’ Pwn2Own contest.However, the Pwn2Own rules don’t require researchers to disclose sandbox-escape vulnerabilities to vendors, primarily because the prize money wouldn’t justify their disclosure. This means that there is still one highly critical Chrome vulnerability out there that remains unpatched.The Chrome security team suspects that it’s located in the Flash Player plug-in bundled with the browser by default and not in Chrome’s own code. There is no confirmation from VUPEN regarding this theory, but if true, the task of patching the vulnerability would fall with Adobe Systems. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe