Breaking News

JEDEC Sets the Stage for the Next Leap in Flash Storage With UFS 5.0 MSI Launches Its First Back-Connection Graphics Card—GeForce RTX 5070 Ti 16G VENTUS 3X PZ Series TAMRON announces the Class-Leading Compact and Lightweight Telephoto Zoom, 70-180mm F2.8 VC G2 SAMA Announces Amazon Prime Big Deal Days Discounts on Gaming PC Cases, CPU Coolers, and ATX 3.1 PSUs Elgato Drives Audio Innovation with Two Next-Gen Tools

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Pwn2Own Hacking Contest Win Record $400K So Far

Pwn2Own Hacking Contest Win Record $400K So Far

Enterprise & IT Mar 13,2014 0

The first day of Pwn2Own 2014 saw successful attempts by five entrants against five products including Internet Explorer, Firefox, and Adobe Flash and Reader. The result was payouts of $400,000 to researchers in the main competition and $82,500 to charity in the Pwn4Fun sponsors-only event. At Pwn4Fun, Google delivered a very impressive exploit against Apple Safari launching Calculator as root on Mac OS X. Hewlett-Packard's ZDI (Zero Day Initiative) presented a multi-stage exploit, including an adaptable sandbox bypass, against Microsoft Internet Explorer, launching Scientific Calculator (running in medium integrity) with continuation. Combined, the two efforts raised $82,500 for the Canadian Red Cross, the charity agreed upon by both sponsors.

A team from Vupen, a French vulnerability research firm, ended Wednesday $300,000 richer, having hacked Adobe Flash, Adobe Reader, Firefox, and IE11 for a one-day foursome.

To attack Adobe Flash, they exploited a use-after-free vulnerability with an IE sandbox bypass, which resulted in code execution.

"Use-after-free" is a term for a type of memory management bug.

Against Adobe Reader, they demonstrated a heap overflow and PDF sandbox escape, resulting in code execution.

A "sandbox" is an anti-exploit technology deployed by some software that is designed to isolate an application so that if attackers do find a vulnerability in the code, they must "escape" the sandbox, to execute their malicious code on the machine.

Microsoft Internet Explorer's sandbox was bypassed due to a use-after-free vulnerability causing object confusion in the broker.

"Broker" is the label for the part of the sandbox that acts as the supervisor for all protected processes.

Vupen researchers also hit Mozilla's Firefox by taking advantage of a use-after-free flow resulting in code execution.

Researchers Mariusz Mlynski and Jri Aedla atacked Firefox, with each winner picking up $50,000 for their exploit.

Pwn2Own continues today, with researchers slated to tackle Apple's Safari and Google's Chrome, as others take additional attempts at Adobe Flash, Firefox and Internet Explorer.

Also yesterday, Google ran its own one-day "Pwnium 4" contest at CanSecWest, pitting researchers against Chrome OS. A researcher has successfully exploited Chrome OS on an HP Chromebook 11, winning the notebook and a $150,000 prize.

Tags: Pwn2OwnHacking
Previous Post
Google Offers 1TB Of Cloud Storage For $10
Next Post
European Parliament Approves Common Mobile Charger Plan

Related Posts

  • MSI has been hacked, be warned about where you download files

  • Hackers gain access to PS5 Debug Menu and show decrypted PS5 firmware files

  • HP Threat Research Shows Attackers Exploiting Zero‐Day Vulnerability Before Enterprises Can Patch

  • EA Gets hacked - 780GB of data and sourcecode stolen

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Microsoft Offers You $100,000 If You Can Hack the Linux-based Azure Sphere

  • Zoom Users' Data have Been on Sale on Dark Web: report

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

Latest News

JEDEC Sets the Stage for the Next Leap in Flash Storage With UFS 5.0
Cameras

JEDEC Sets the Stage for the Next Leap in Flash Storage With UFS 5.0

MSI Launches Its First Back-Connection Graphics Card—GeForce RTX 5070 Ti 16G VENTUS 3X PZ Series
GPUs

MSI Launches Its First Back-Connection Graphics Card—GeForce RTX 5070 Ti 16G VENTUS 3X PZ Series

TAMRON announces the Class-Leading Compact and Lightweight Telephoto Zoom, 70-180mm F2.8 VC G2
Cameras

TAMRON announces the Class-Leading Compact and Lightweight Telephoto Zoom, 70-180mm F2.8 VC G2

SAMA Announces Amazon Prime Big Deal Days Discounts on Gaming PC Cases, CPU Coolers, and ATX 3.1 PSUs
Cooling Systems

SAMA Announces Amazon Prime Big Deal Days Discounts on Gaming PC Cases, CPU Coolers, and ATX 3.1 PSUs

Elgato Drives Audio Innovation with Two Next-Gen Tools
Consumer Electronics

Elgato Drives Audio Innovation with Two Next-Gen Tools

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed