Monday, October 20, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Biostar Relases New iDEQ-T1 Compact Desktop
SK Telecom and Samsung Join Hands to Lead 5G Network Technology
Pantech Applied for Bankruptcy Protection In The US
Glonbalfoundries Buy IBM's Micorelectronics Business
Microsoft To Launch A Wearable Device Soon
FCC To Explore High-frequency Wireless Technologies
Mozilla Hello Offers Voice and Video Calls Through The Browser
Samsung Adds Intel Processor To Chromebook 2
Active Discussions
How to generate lots of different CDs quickly
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
 Home > News > General Computing > Pwn2Own...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, March 13, 2014
Pwn2Own Hacking Contest Win Record $400K So Far


The first day of Pwn2Own 2014 saw successful attempts by five entrants against five products including Internet Explorer, Firefox, and Adobe Flash and Reader. The result was payouts of $400,000 to researchers in the main competition and $82,500 to charity in the Pwn4Fun sponsors-only event.

At Pwn4Fun, Google delivered a very impressive exploit against Apple Safari launching Calculator as root on Mac OS X. Hewlett-Packard's ZDI (Zero Day Initiative) presented a multi-stage exploit, including an adaptable sandbox bypass, against Microsoft Internet Explorer, launching Scientific Calculator (running in medium integrity) with continuation. Combined, the two efforts raised $82,500 for the Canadian Red Cross, the charity agreed upon by both sponsors.

A team from Vupen, a French vulnerability research firm, ended Wednesday $300,000 richer, having hacked Adobe Flash, Adobe Reader, Firefox, and IE11 for a one-day foursome.

To attack Adobe Flash, they exploited a use-after-free vulnerability with an IE sandbox bypass, which resulted in code execution.

"Use-after-free" is a term for a type of memory management bug.

Against Adobe Reader, they demonstrated a heap overflow and PDF sandbox escape, resulting in code execution.

A "sandbox" is an anti-exploit technology deployed by some software that is designed to isolate an application so that if attackers do find a vulnerability in the code, they must "escape" the sandbox, to execute their malicious code on the machine.

Microsoft Internet Explorer's sandbox was bypassed due to a use-after-free vulnerability causing object confusion in the broker.

"Broker" is the label for the part of the sandbox that acts as the supervisor for all protected processes.

Vupen researchers also hit Mozilla's Firefox by taking advantage of a use-after-free flow resulting in code execution.

Researchers Mariusz Mlynski and Jri Aedla atacked Firefox, with each winner picking up $50,000 for their exploit.

Pwn2Own continues today, with researchers slated to tackle Apple's Safari and Google's Chrome, as others take additional attempts at Adobe Flash, Firefox and Internet Explorer.

Also yesterday, Google ran its own one-day "Pwnium 4" contest at CanSecWest, pitting researchers against Chrome OS. A researcher has successfully exploited Chrome OS on an HP Chromebook 11, winning the notebook and a $150,000 prize.




Previous
Next
Google Offers 1TB Of Cloud Storage For $10        All News        European Parliament Approves Common Mobile Charger Plan
Google Offers 1TB Of Cloud Storage For $10     General Computing News      Apple Patent Hints On Health-related Wearable Device

Get RSS feed Easy Print E-Mail this Message

Related News
iSIGHT Discovers Windows Server Vulnerability Used in Russian Cyber-espionage Campaign
JPMorgan Hack Is Among Biggest Breaches in History
Hackers Exploit 'Shellshock' Cyber Thread
JPMorgan Servers Hacked in June
Health Data Stolen in Cyber Attack from China
Hackers Stole Over 1 Billion Records
Hackers Can Use USB Devices in Attacks
U.S. Arrests Russian Accused Of Hacking Retail Systems
Montana State Says 1.3 Million Records Exposed in Data Breach
Hackers Used YouTube To Sell Stolen Credit Card Data
Hackers Attack Dominos Pizza, Steal Customers' Data
Iranian Hackers Use Fake Social Media Accounts To Spy

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .