Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Google Patches Chrome Flaw That Earned Hackers $42,500 at Pwn2Own

Google pushes a new Chrome update to patch another zero-day vulnerability demonstrated at a hacking contest.

Chrome security

Google on Tuesday announced a new Chrome update that resolves another zero-day vulnerability demonstrated at the Pwn2Own hacking contest in March.

Tracked as CVE-2024-3159, the high-severity bug is described as an out-of-bounds memory access issue in the V8 JavaScript and WebAssembly engine.

The flaw was exploited at Pwn2Own Vancouver 2024 by Edouard Bochin and Tao Yan from Palo Alto Networks, who received a $42,500 bug bounty reward for their finding.

The researchers “used an OOB Read plus a novel technique for defeating V8 hardening to get arbitrary code execution in the renderer,” Trend Micro’s Zero Day Initiative (ZDI) announced on March 22.

CVE-2024-3159 is the third Chrome zero-day flaw demonstrated at Pwn2Own to have been resolved, after a Chrome update last week that addressed CVE-2024-2886 and CVE-2024-2887, a use-after-free in WebCodecs and a type confusion bug in WebAssembly, respectively.

In addition to CVE-2024-3159, the latest Chrome update resolves two other vulnerabilities reported by external researchers.

Advertisement. Scroll to continue reading.

These include CVE-2024-3156, an inappropriate implementation issue in the V8 engine, and CVE-2024-3158, a use-after-free bug in Bookmarks.

Google says it paid out a total of $10,000 in bug bounties for these two issues, namely $7,000 and $3,000, respectively. No additional bounty was issued for CVE-2024-3159, aside from the reward handed out at Pwn2Own.

The latest Chrome iteration is now rolling out as versions 23.0.6312.105/.106/.107 for Windows and macOS, and as version 123.0.6312.105 for Linux.

Google makes no mention of any of these security defects being exploited in the wild. Users are advised to update their browsers as soon as possible.

Related: Chrome to Fight Cookie Theft With Device Bound Session Credentials

Related: Chrome 123, Firefox 124 Patch Serious Vulnerabilities

Related: Chrome 122, Firefox 123 Patch High-Severity Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.