Wednesday, July 26, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Razer Tiamat Flagship Headsets Released
Adobe Pulls Plug on Flash Player
Burn-in Warranty for Samsung QLED TV Screens Extended to 10 Years
New USB 3.2 Update Doubling Bandwidth to Extend USB Type-C Cable Performance
New Motorola Z2 Force Edition Comes With 360-degree Camera Mod
Huawei Holds First Place, Xiaomi Climbs to Fourth in Chinese Smartphone Shipments
Google Adds SOS Alerts to Search and Maps
Porsche Design's Huawei Watch 2 Costs $925
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > IE, Fir...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, March 07, 2013
IE, Firefox, Chrome and Java "Pwned"


Java, IE 10, Firefox and Chrome went down by various competitors during the first day of the Pwn2Own competition held at the CanSecWest conference in Vancouver.

The basic winner is french security firm Vupen. Their team successfuly compromised IE 10 on Windows 8 with two zero-days and achieved a full Windows 8 compromise with sandbox bypass; Firefox 19 on Windows 7 by using a use-after-free vulnerability and a brand new technique to bypass ASLR/DEP protection on Windows 7 without the need of any ROP (Return-oriented programming); Java 7 on Windows 7 by using a same unique heap overflow as a memory leak to bypass ASLR and as a code execution.

Oracle's Java was also "hit" by researcher James Forshaw and Accuvant LABS security research scientist Joshua Drake.

Researchers Jon Butler and Nils from UK-based MWR Labs managed to exploit the latest stable Google Chrome version on Windows 7 and then used a kernel bug to bypass the sandbox. The researchers showed an exploit against previously undiscovered vulnerabilities in Google Chrome running on a modern Windows-based laptop. By visiting a malicious webpage, it was possible to exploit a vulnerability which allowed them to gain code execution in the context of the sandboxed renderer process. The researchers also used a kernel vulnerability in the underlying operating system in order to gain elevated privileges and to execute arbitrary commands outside of the sandbox with system privileges.

In the second day of the contest, Vupen is scheduled to take on Flash, Pharm Toan will take a stab at IE 10, and George Hotz will be hitting Adobe Reader.


Previous
Next
New Studio Partnerships For NOOK Video        All News        Samsung To Stop Windows RT-based Selling Ativ Tab Tablets in Europe
New Studio Partnerships For NOOK Video     General Computing News      Google Transparency Report Unveils FBI's Eye On The Web

Get RSS feed Easy Print E-Mail this Message

Related News
ASUS 360 Chromebook Flip C213 is Starting at $349
Hackers Attacked U.K. Parliament
Firefox Focus Browser For Android Blocks Ads and Protects your Privacy
GLOBALFOUNDRIES Says New 7LP Technology Offers 40 Percent Performance Boost Over 14nm FinFET
Alienware and Dell Unveil New PC Gaming Systems at E3
Google Chrome to Get Ad Blocker Next Year
GLOBALFOUNDRIES and Chengdu Invest in China-based FDX FD-SOI Design Centers
WikiLeaks Says 'Athena' CIA Spying Program Targets All Versions of Windows
Samsung Chromebook Pro Available on May 28 For $550
Google Dedicates Second Day of Google I/O on Daydream, Tango, and Developer tools for VR and AR
Google I/O: Google Digital Assistant Coming to iPhone, Android O, Android Go, New TPU and VR
Samsung's Gear VR to Retain Lead in 2017 as Google's Daydream Platform Emerges

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .