Pwn2Own Competition Results in 0-Days for Chrome, Firefox, IE, Java and Flash

You've got to love hacker conferences. Software vulnerabilities are never going away, that much is obvious, but it's with competitions at hacker conferences where we can really see just how vulnerable the software we use every single day is. Putting this into perspective, prior to the Pwn2Own conference in Canada, Google patched-up ten bugs in Chrome - six of which were considered severe. Despite that, Chrome was hit with a zero-day during the conference that granted code execution in the browser's sandbox renderer process.

Chrome is hardly the only guilty party, however. Equally-severe exploits were presented for IE 10 under Windows 8, IE 9 under Windows 7, Firefox under Windows 7 and Safari under OS X Mountain Lion. Aside from browsers, Adobe's Flash and Oracle's Java also had some flaws demonstrated. Ironically, despite the sheer number of bugs creeping through the cracks for Java lately, the bounty on its exploit was only $20,000. By comparison, $100,000 was being offered for breaking Chrome under Windows 7.

For the hackers, these exploits have paid off handsomely, but fortunately for the rest of us, the execution specifics are going into lock-down, and the victim companies will be worked with privately to get the issues patched up.

Via:  SC Magazine
Comments
rapid1 one year ago

Anyone interested in getting in on a group buy (20% off) for a Max Mechanical keyboard click this or copy and paste this link

http://www.forums.custompcreview.com/f75/max-keyboard-group-buy-thread-13-a-1555/

and sign up for it I just got the group started but need some more participants.

CraigSeamons1 one year ago

I love pwn2own. Thank you for the post.

realneil one year ago

Seems that they ~all~ get busted every year.

It never seems to take long either.

3vi1 one year ago

Doesn't take long because the participants have worked out the hacks for every OS/browser months in advance. The systems fall in the order of what's running on the most expensive hardware, since the contestants get to keep the hardware. That's why people generally take down the Apple stuff first.

realneil one year ago

[quote user="3vi1"]Doesn't take long because the participants have worked out the hacks for every OS/browser months in advance. The systems fall in the order of what's running on the most expensive hardware, since the contestants get to keep the hardware. That's why people generally take down the Apple stuff first.[/quote]

Yeah, I've noticed that too. But they keep having competitions every year just to give away hardware. If any of them were to last for a while, they'll be crowing about how secure they are for months afterward. None of them really are.

If I were  putting my browser up against the others, I would release the most secure version the morning of the contest,.....LOL!

 

3vi1 one year ago

>> If any of them were to last for a while, they'll be crowing about how secure they are for months afterward.

ChromeOS (Linux, with Chrome as the UI) has remained undefeated at Pwnium 3, despite the fact that Google offered $3.14159 million in bounties:

http://www.engadget.com/2013/03/08/chrome-os-fends-off-all-hacks-at-pwnium-3-others-fall-at-pwn2own/

Post a Comment
or Register to comment