Menu
Safari, Chrome and Flash Player hacked during first day at Pwn2Own, some of them twice

Safari, Chrome and Flash Player hacked during first day at Pwn2Own, some of them twice

Hackers take home $282,500 on the contest's first day

Security researchers exploited previously unknown vulnerabilities in Apple Safari, Google Chrome and Flash Player to compromise the latest versions of OS X and Windows during the first day of the annual Pwn2Own hacking contest.

On Wednesday, four teams and a researcher who competed on his own made six attempts to hack this year's targets: Safari running on OS X, Chrome running on Windows, Microsoft Edge running on Windows and Flash Player on Windows. Four attempts were successful, one was only partially successful and one failed.

The 360Vulcan Team from Chinese Internet security company Qihoo 360 combined a remote code execution vulnerability in Flash Player with a vulnerability in the Windows kernel to gain system privileges. For this feat, they received a US$80,000 prize, $60,000 for the Flash Player exploit and a $20,000 bonus for the system-level escalation.

Later in the day, the same team demonstrated a remote code execution attack against Google Chrome on Windows that members also managed to escalate to system. For that attack, they combined exploits for four vulnerabilities: one in Chrome, two in Flash and one in the Windows kernel.

The attack was considered only a partial win, because the Chrome flaw had previously been reported to Google by an independent researcher without the team's knowledge, so it didn't qualify as a zero-day. The team still won $52,500, putting their first-day payout at $132,500.

South Korean researcher JungHoon Lee, known in hacking circles as lokihardt, demonstrated a remote code execution attack against Apple Safari on OS X with an escalation to root privileges. He also combined four vulnerabilities, earning a $60,000 prize.

This year, Safari exploits are rewarded with $40,000, compared to $60,000 for Chrome and Microsoft Edge on Windows. The privilege escalation bonus of $20,000 is available for both Windows and OS X.

It's worth noting that during last year's edition of Pwn2Own, JungHoon Lee was the most successful contestant, taking home $225,000, almost half of the total payout.

He still has time to come on top this year, too, because he was scheduled to attempt attacks against Chrome and Microsoft Edge on Thursday, the contest's second day. Meanwhile, 360Vulcan Team, which is currently in the lead, has no other demonstrations scheduled.

Chinese Internet giant Tencent has three teams in the contest, with members from several of its subsidiaries.

During the first day, Tencent Security Team Shield demonstrated an attack against Safari to achieve root-level code execution. The exploit combined two vulnerabilities, one in Safari and one in another privileged process, and earned the team $40,000.

Meanwhile, Tencent Security Team Sniper demonstrated an attack against Flash Player on Windows that involved privilege escalation to system, for which the group received $50,000.

The third Tencent team, Xuanwu Lab, tried an exploit against Adobe Flash in Microsoft Edge, but it failed to work.

During the first day, security researchers won $282,500 and disclosed 15 previously unknown vulnerabilities. The exploits were shared with contest organizers from the Zero Day Initiative, which is now part of Trend Micro, and will be reported to the affected vendors. 

This year, the Pwn2Own contest is sponsored by Trend Micro and Hewlett Packard Enterprise and has a total prize pool around $600,000.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Show Comments