04:29 PM
Connect Directly

Google Offers Hackers Bucks For Chrome Bugs

New vulnerability disclosure incentive program pays a minimum $500 per critical bug

Google is now offering hackers money for discovering vulnerabilities in its Chrome browser -- a practice already in place at Mozilla.

The experimental incentive program is meant to entice researchers outside of the Chromium project to provide security feedback for the browser. Google says it will pay $500 for an eligible bug discovery and $1,337 for an especially severe or clever vulnerability; a single bug could be considered as multiple vulnerabilities.

"The more people involved in scrutinizing Chromium's code and behavior, the more secure our millions of users will be," said Chris Evans, Google Chrome Security, in a blog post today announcing the new program.

Google credited Mozilla for the idea of offering rewards for vulnerability finds in its software.

Chrome security has been on the front burner for Google this week. The search engine giant on Monday issued an update to Chrome that included security fixes and new features, including stronger transport security and a cross-site scripting (XSS) protection feature.

But the practice of offering bug bounties traditionally has been controversial, with opponents saying it sends the wrong message and supporters saying researchers should receive compensation for their efforts in helping vendors pinpoint holes. Companies such as TippingPoint's ZDI and iDefense have paid outside researchers for their finds for some time.

But some experts argue it can backfire because the black market pays more for vulnerability discoveries.

"Acknowledging there's a commercial market for flaws is also acknowledging that you're leaving open the possibility that someone is going to make a lot more money in the dark markets," says Joshua Corman, research director for the enterprise security practice at The 451 Group. "The idea is that you want to encourage researchers to proactively beat up your software so you can fix it before it's exploited by the bad guys. That's a great idea. But the wrinkle is that you're planting a seed that otherwise might not have been there, that, 'I might make money on this.'"

And these bug incentive programs don't prevent zero-day vulnerability discoveries from nonparticipants, he says.

Google says bugs just in Chrome or in the overall Chromium open-source project are eligible for the incentive program, but not vulnerabilities in third-party plug-ins.

"We encourage responsible disclosure. Note that we believe responsible disclosure is a two-way street; it's our job to fix serious bugs within a reasonable time frame," Evans said.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.