Breaking News

Gigabyte announces X870 and B850 AORUS STEALTH ICE Samsung Launches Odyssey G6 World’s First 500Hz OLED Gaming Monitor Samsung Galaxy S25 Edge Features New Corning Gorilla Glass Ceramic 2 for Enhanced Durability Razer announces Clio Chair Accessory for Audio Immersion Razer Unveils Ergonomic Gaming Mouse and Keyboard for Gaming on the Go

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Major Browsers Attacked During Pwn2Own 2015 Contest

Major Browsers Attacked During Pwn2Own 2015 Contest

Enterprise & IT Mar 20,2015 0

Security researchers who participated in the Pwn2Own hacking contest this week demonstrated remote code execution exploits against the top four browsers, and also hacked Adobe Reader and Flash Player plug-ins. The second and final day of Pwn2Own 2015 saw successful exploits by both entrants against four products, with each going after multiple targets and collecting a total of $235,000.

This brings the two-day payout total to $552,500, not including the value of the laptops, ZDI points, and other prizes given to winning researchers..

On Thursday, a researcher who uses the hacker handle ilxu1a took down Mozilla Firefox with an out-of-bounds read/write vulnerability leading to medium-integrity code execution. He reports he found the bug through static analysis, which is impressive. ilxu1a received $15,000 USD for the bug.

For the first of his three targets, South Korean security researcher JungHoon Lee (lokihardt) took out 64-bit Internet Explorer 11 with a time-of-check to time-of-use (TOCTOU) vulnerability allowing for read/write privileges. He evaded all the defensive mechanisms by using a sandbox escape through privileged JavaScript injection, all of which resulted in medium-integrity code execution. This got his day started out right with a payout of $65,000 USD.

Next, JungHoon Lee (lokihardt) demonstrated an exploit that affects both the stable and beta versions of Google Chrome. He leveraged a buffer overflow race condition in Chrome, then used an info leak and race condition in two Windows kernel drivers to get SYSTEM access. With all of this, lokihardt managed to get the single biggest payout of the competition, not to mention the single biggest payout in Pwn2Own history: $75,000 USD for the Chrome bug, an extra $25,000 for the privilege escalation to SYSTEM, and another $10,000 from Google for hitting the beta version for a grand total of $110,000. To put it another way, lokihardt earned roughly $916 a second for his two-minute demonstration.

For his final act of the competition, JungHoon Lee (lokihardt) took out Apple Safari using a use-after-free (UAF) vulnerability in an uninitialized stack pointer in the browser and bypassed the sandbox for code execution. That netted him another $50,000 USD and brought his daily total to $225,000.

The final entrant in Pwn2Own 2015, ilxu1a, attempted to exploit Google Chrome, but ran out of time before he could get his code working.

As with every Pwn2Own, all vulnerabilities were disclosed to their respective vendors and each vendor is working to fix these bugs through their own processes.

The final numbers for Pwn2Own 2015 are impressive:

  • 5 bugs in the Windows operating system
  • 4 bugs in Internet Explorer 11
  • 3 bugs in Mozilla Firefox
  • 3 bugs in Adobe Reader
  • 3 bugs in Adobe Flash
  • 2 bugs in Apple Safari
  • 1 bug in Google Chrome
  • $442,500 USD bounty paid out to researchers

The Pwn2Own contest takes place every year at the CanSecWest security conference in Vancouver, Canada, and is sponsored by Hewlett-Packard's Zero Day Initiative program.

During day 1, researchers saw successfully exploited Adobe Flash. The team of Zeguang Zhao (Team509), Peter, Jihui Lu, and wushi (KeenTeam) used a heap overflow remote code execution vulnerability in Flash, then leveraged a local privilege escalation in the Windows kernel through TrueType fonts, bypassing all defensive measures. They were awarded $60,000 USD for the Flash bug and a bonus of $25,000 for the SYSTEM escalation.

Nicolas Joly followed with his own exploit of Flash. He used a use-after-free (UAF) remote code execution vulnerability and sandbox escape directory traversal vulnerability in the Flash broker. He was awarded $30,000 for his efforts.

Nicolas continued his exploitation domination by taking down Adobe Reader through a stack buffer overflow – once for an info leak and again for remote code execution. He then leveraged an integer overflow to exploit the broker, netting him a cool $60,000 USD.

From there, Peter, Jihui Lu, Wen Xu, wushi (KeenTeam), and Jun Mao (Tencent PCMgr) continued rollin’ in the heap by taking down Adobe Reader with an integer overflow and achieved pool corruption through a different TTF bug. This got them SYSTEM access and a total of $55,000 USD - $30,000 for the Reader bug and another $25,000 bonus for the SYSTEM escalation.

Tags: Pwn2Own
Previous Post
Consumer Watchdog Calls On FTC To Re-Open Its Google Investigation
Next Post
HTC Founder Wang Becomes New CEO

Related Posts

  • Pwn2Own 2020: Hackers Targeted Ubuntu, VMWare, Windows 10 and More

  • Researchers to Challenge Tesla Model 3, Web Browsers and More at Pwn2Own Contest

  • Pwn2Own Tokyo 2019 Concludes With Six Successful Hacking Attempts, $315,000 Awarded

  • Amazon Echo, Samsung and Sony smart TVs Fall on first day of Pwn2Own Hacking Contest

  • Edge, Firefox, Safari, And Tesla Hacked At Pwn2Own 2019

  • Tesla to Offer a Model 3 to be "Pwnd"

  • Hackers Demonstrate VM Escapes In Pwn2Own 2017 Hacking Contest

  • Security Researchers Pocket $850K In Pwn2Own Contest

Latest News

Gigabyte announces X870 and B850 AORUS STEALTH ICE
PC components

Gigabyte announces X870 and B850 AORUS STEALTH ICE

Samsung Launches Odyssey G6 World’s First 500Hz OLED Gaming Monitor
Gaming

Samsung Launches Odyssey G6 World’s First 500Hz OLED Gaming Monitor

Samsung Galaxy S25 Edge Features New Corning Gorilla Glass Ceramic 2 for Enhanced Durability
Smartphones

Samsung Galaxy S25 Edge Features New Corning Gorilla Glass Ceramic 2 for Enhanced Durability

Razer announces Clio Chair Accessory for Audio Immersion
Consumer Electronics

Razer announces Clio Chair Accessory for Audio Immersion

Razer Unveils Ergonomic Gaming Mouse and Keyboard for Gaming on the Go
PC components

Razer Unveils Ergonomic Gaming Mouse and Keyboard for Gaming on the Go

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Rock 5

be quiet! Dark Rock 5

G.skill Trident Z5 Neo RGB DDR5-6000 64GB CL30

G.skill Trident Z5 Neo RGB DDR5-6000 64GB CL30

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Arctic Liquid Freezer III 420 - 360

Arctic Liquid Freezer III 420 - 360

Crucial Pro OC 32GB DDR5-6000 CL36 White

Crucial Pro OC 32GB DDR5-6000 CL36 White

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed