Friday, January 30, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Apple Closes the Gap on Samsung Fourth Quarter's Worldwide Smartphone Shipments
Verizon To Let USers Opt Out Supercookies
Microsoft Outlines Windows 10 Options For The Enterprise
Jolla Tablet Returns to Indiegogo With A 64GB Version
BT Sees Ultrafast Broadband Not Coming Earlier Than 2025
Google To Change Privacy Policy After UK's Watchdog Investigation
HDDs Shipments Increased In 2014
FCC To Fine AT&T For Unathorized Operation Of Wireless Stations
Active Discussions
Writing Audio files on DVDs ?
Need major help with Gigabeat
New match-3 puzzle game launch now!
Rimage 2000i
Sound card for my Laptop
hello
full screen wide screen
Hi
 Home > News > General Computing > IE, Fir...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, March 07, 2013
IE, Firefox, Chrome and Java "Pwned"


Java, IE 10, Firefox and Chrome went down by various competitors during the first day of the Pwn2Own competition held at the CanSecWest conference in Vancouver.

The basic winner is french security firm Vupen. Their team successfuly compromised IE 10 on Windows 8 with two zero-days and achieved a full Windows 8 compromise with sandbox bypass; Firefox 19 on Windows 7 by using a use-after-free vulnerability and a brand new technique to bypass ASLR/DEP protection on Windows 7 without the need of any ROP (Return-oriented programming); Java 7 on Windows 7 by using a same unique heap overflow as a memory leak to bypass ASLR and as a code execution.

Oracle's Java was also "hit" by researcher James Forshaw and Accuvant LABS security research scientist Joshua Drake.

Researchers Jon Butler and Nils from UK-based MWR Labs managed to exploit the latest stable Google Chrome version on Windows 7 and then used a kernel bug to bypass the sandbox. The researchers showed an exploit against previously undiscovered vulnerabilities in Google Chrome running on a modern Windows-based laptop. By visiting a malicious webpage, it was possible to exploit a vulnerability which allowed them to gain code execution in the context of the sandboxed renderer process. The researchers also used a kernel vulnerability in the underlying operating system in order to gain elevated privileges and to execute arbitrary commands outside of the sandbox with system privileges.

In the second day of the contest, Vupen is scheduled to take on Flash, Pharm Toan will take a stab at IE 10, and George Hotz will be hitting Adobe Reader.


Previous
Next
New Studio Partnerships For NOOK Video        All News        Samsung To Stop Windows RT-based Selling Ativ Tab Tablets in Europe
New Studio Partnerships For NOOK Video     General Computing News      Google Transparency Report Unveils FBI's Eye On The Web

Get RSS feed Easy Print E-Mail this Message

Related News
Smart TVs Could Be Hackers' Next Target
Malaysia Airlines And Russian Dating Sites Topface Websites Hacked
Acer Releases New Chromebooks For Education
Man Arrested in U.K On Suspicion of Christmas Xbox, Playstation Hacks
Latest Firefox Streamlines Video Calling
Military Twitter Accounts And YouTube Sites Hacked
Anonymous Hackers Declare War To Jihadists
Group Claims Responsibility For Attacks Against German Government Websites
Google Introduces Cast for Audio
LaCie Rugged RAID And Mirror Portable Hard Drives Debut At CES
Next Windows To Launch With More Elegant Internet Browser: report
Anonymous Declares War on Lizard Squad Hacker Team Who Took Down Playstation And Xbox Networks

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .