Vulnerabilities / Threats

1/19/2018
12:00 PM
100%
0%

Google Pays Researcher Record $112,500 for Android Flaw

The bug bounty reward, given to a researcher who submitted a working remote exploit chain, is Google's highest for an Android bug.

Google has awarded its highest-ever bug bounty for an Android flaw, the company announced this week. The $112,500 reward was paid to a researcher who submitted the first working remote exploit chain since the Android Security Rewards (ASR) program expanded in June 2017.

Guang Gong, from the Alpha Team at Qihoo 360 Technology, submitted his report in August. The exploit chain he found includes two bugs: CVE-2017-5116 and CVE-2017-14904. The first is a V8 engine bug used to get remote code execution in the sandboxed Chrome render process. The second, a bug in Android's libgralloc module, is used to escape from Chrome's sandbox.

Together, the exploit chain can be used to inject arbitrary code into system_server by accessing a malicious URL in Chrome. Gong's findings earned him $105,000 from ASR, the highest reward in the history of the program. He was also given $7,500 from the Chrome Rewards program.

The full set of issues Gong discovered was addressed in the December 2017 monthly security update, and all devices with security patches of 2017-12-05 or later are protected. Pixel devices and partner devices using A/B updates will automatically install the fixes when restarted.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MariaColeman
50%
50%
MariaColeman,
User Rank: Apprentice
1/23/2018 | 11:55:15 AM
Why so much?
But for what? I can't understand( 
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20735
PUBLISHED: 2019-01-17
** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
CVE-2019-0624
PUBLISHED: 2019-01-17
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0646
PUBLISHED: 2019-01-17
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0647
PUBLISHED: 2019-01-17
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.
CVE-2018-20727
PUBLISHED: 2019-01-17
Multiple command injection vulnerabilities in NeDi before 1.7Cp3 allow authenticated users to execute code on the server side via the flt parameter to Nodes-Traffic.php, the dv parameter to Devices-Graph.php, or the tit parameter to drawmap.php.