Breaking News

New Transcend CFexpress 830 Type B Targets 8K RAW, High-Speed Shooting, and Pro Video Production Elgato Puts Premium Seating Within Reach ASUS Unveils ProArt PA401, PA602 Wood Edition PC Cases with Retro Colors Synology Releases DiskStation Manager 7.3 Shuttle Introduces DH810 Compact Mini PC with Intel Core Ultra Processors

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Pwn2Own Hackers Found Exploits In Safari, Adobe Reader, macOS And More

Pwn2Own Hackers Found Exploits In Safari, Adobe Reader, macOS And More

Enterprise & IT Mar 16,2017 0

The tenth anniversary of the Pwn2Own competition kicked off and hackers from around the world succeded in proving vulnerabilities in some very popular software, including Ubuntu dektop, Adobe Reader, Apple Safari and Microsoft Edge.

This year's event features 11 teams of contestants targeting products across four categories - 30 different attempts in total. Each contestant haves three attempts within their allotted timeslot to demonstrate the exploit.

The results for Day One is below are the following:

  • 360 Security (@mj0011sec) targeting Adobe Reader

The team used a jpeg2000 heap overflow in Adobe Reader, a Windows kernel info leak, and an RCE through an uninitialized buffer in the Windows kernel to take down Adobe Reader. In the process, they have earned themselves $50,000 USD and 6 points towards Master of Pwn.

  • Samuel Gro? (@5aelo) and Niklas Baumstark (_niklasb) targeting Apple Safari with an escalation to root on macOS

In a partial sucsess, Samuel Gro? (@5aelo) and Niklas Baumstark (@_niklasb) earn some style points by leaving a special message on the touch bar of the Mac. They used a use-after-free (UAF) in Safari combined with three logic bugs and a null pointer dereference to exploit Safari and elevate to root in macOS. They still managed to earn $28,000 USD and 9 Master of Pwn points.

  • Tencent Security - Team Ether targeting Microsoft Edge

Tencent Security - Team Ether successfully exploits Microsoft edge through an arbitrary write in Chakra core. They used a logic bug to escape the sandbox and earn themselves $80,000 and 10 points for Master of Pwn.

  • Chaitin Security Research Lab (@ChaitinTech) targeting Ubuntu Desktop

The Chaitin Security Research Lab (@ChaitinTech) welcomes Ubuntu Linux to Pwn2Own with a Linux kernel heap out-of-bound access. They earned themselves $15,000 and 3 Master of Pwn points.

  • Tencent Security - Team Sniper (Keen Lab and PC Mgr) targeting Adobe Reader

Tencent Security - Team Sniper (Keen Lab and PC Mgr) used an info leak in Reader followed by a UAF to get code execution, then they leveraged a UAF in the kernel to gain SYSTEM-level privileges, winning $25,000 and 6 Master of Pwn points.

  • Chaitin Security Research Lab (@ChaitinTech) targeting Apple Safari with an escalation to root on macOS

The Chaitin Security Research Lab (@ChaitinTech) successfuly exploited Apple Safari to gain root access on macOS by using a total of six bugs in their exploit chain including an info disclosure in Safari, four different type confusions bugs in the browser, and an a UAF in WindowServer. This earned the team $35,000 and 11 points towards Master of Pwn.

Tags: Hacking
Previous Post
JDI Expands Automotive LCD Production Capacity
Next Post
Google Family Link app Will Help You Monitor Your Kid's Android Device

Related Posts

  • MSI has been hacked, be warned about where you download files

  • Hackers gain access to PS5 Debug Menu and show decrypted PS5 firmware files

  • HP Threat Research Shows Attackers Exploiting Zero‐Day Vulnerability Before Enterprises Can Patch

  • EA Gets hacked - 780GB of data and sourcecode stolen

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Microsoft Offers You $100,000 If You Can Hack the Linux-based Azure Sphere

  • Zoom Users' Data have Been on Sale on Dark Web: report

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

Latest News

New Transcend CFexpress 830 Type B Targets 8K RAW, High-Speed Shooting, and Pro Video Production
Cameras

New Transcend CFexpress 830 Type B Targets 8K RAW, High-Speed Shooting, and Pro Video Production

Elgato Puts Premium Seating Within Reach
Consumer Electronics

Elgato Puts Premium Seating Within Reach

ASUS Unveils ProArt PA401, PA602 Wood Edition PC Cases with Retro Colors
Cooling Systems

ASUS Unveils ProArt PA401, PA602 Wood Edition PC Cases with Retro Colors

Synology Releases DiskStation Manager 7.3
Enterprise & IT

Synology Releases DiskStation Manager 7.3

Shuttle Introduces DH810 Compact Mini PC with Intel Core Ultra Processors
Enterprise & IT

Shuttle Introduces DH810 Compact Mini PC with Intel Core Ultra Processors

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed