Pwn2own Day 1 Exploits: Google Chrome, Adobe Flash, Apple Safari

kev216

Level 21
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 6, 2014
1,044
On the first day of the browser-hacking event, $282,500 in prize money was awarded. Researchers exploited vulnerabilities in Chrome, Flash and Safari.

The annual Pwn2own browser-hacking competition at the CanSecWest conference in Vancouver, Canada, started March 16 with $282,500 awarded in first-day prizes.


Hewlett Packard Enterprise and Trend Micro are jointly sponsoring this year's Pwn2own event. As part of the first day, a group of researchers identified as the 360Vulcan Team were the big winners, walking away with $132,500 in prize money for exploiting Adobe Flash and Google Chrome. The Flash exploit made use of a type confusion bug in Adobe Flash as well as a vulnerability in Microsoft's Windows 10.


"The [Windows] kernel vulnerability was a use-after-free vulnerability," Christopher Budd, global threat communications manager at Trend Micro, told eWEEK. "They successfully chained both of these to compromise the target at the system level."


For the Flash and Windows chained exploit, the 360Vulcan Team received $80,000. The second exploit demonstrated by 360Vulcan Team was against Google's Chrome and made use of four new zero-day vulnerabilities, two use-after-free vulnerabilities in Adobe Flash, one use-after-free vulnerability in the Windows Kernel and an out-of-bounds vulnerability in Google Chrome. For the Chrome exploit, 360Vulcan Team was awarded $52,500.




Independent security researcher JungHoon Lee earned $60,000 on the first day of Pwn2own 2016 by exploiting Apple's Safari browser. Lee found four vulnerabilities in total, including issues in Safari as well as Apple's OS X desktop operating system.


"One of the vulnerabilities was in Safari, the other three were vulnerabilities within Mac OS X," Budd said.


Chinese corporation Tencent is well-represented at Pwn2own 2016, with three teams competing—Sniper, Shield and Xuanwu. Tencent's Team Sniper earned $50,000 on the first day of Pwn2own by successfully demonstrating a new attack against Adobe Flash that exposed a new out-of-bounds vulnerability in Flash and a use-after-free vulnerability in Windows.


Tencent's Team Shield's attention was on Apple's Safari, where the group was able to find three new vulnerabilities. One of the vulnerabilities is a use-after-free memory issue in Safari while the other is in a Mac OS X privileged process. For their efforts in attacking Safari on OS X, Tencent's Team Shield was awarded $40,000.


Day Two of Pwn2own 2016 includes Tencent's Team Sniper taking another shot at exploiting Apple's Safari. JungHoon Lee will be attempting to exploit the Microsoft Edge browser as well as Google Chrome. Tencent's Team Shield will use the second day of Pwn2own to attempt to exploit Microsoft Edge as well.


One target that isn't being attempted by security researchers is VMware Workstation. As part of the contest, there is an award for a researcher who is able to execute a hypervisor escape from the VMware Workstation virtual machine on which the Windows-based browsers will be running. Budd isn't surprised that no researcher has decided to try and attack VMware Workstation.


It's a new vector for attack, and one that can be particularly challenging," Budd said. "Given the amount of time required for adequate research, it's not surprising that no one has signed up this year. However, we do expect to see people sign up for this next year."
 

Amiga500

Level 12
Verified
Jan 27, 2013
661
I tend to ignore these sort of contests as they indicate nothing of interest.So chrome and flash get exploited by a group.The chances of coming across these exploits in the wild is..............?.

No doubt these exploits will be retained by whoever created them so why should the public really care.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Flash player is indeed prone to any attacks, its matter of complexity already.

Whereas Chrome and other products that bound Sandbox module is definitely hard enough and takes a lot of time to prove. But of course if you can find a hole in other way form then grab it. ;)
 
  • Like
Reactions: kev216
D

Deleted member 178

Do you seriously think that all those "exploits researchers" will give all their finding when those finding can give them more "incomes" than the prizes :rolleyes:
 
  • Like
Reactions: Cch123 and kev216

Cch123

Level 7
Verified
May 6, 2014
335
The rewards for Pwn2own is decreasing every year while the contest keeps getting harder, with the addition of EMET and all that. Thats why several past highlights like Vupen are no longer participating.

I wonder if anyone will try and exploit Firefox this year? Chrome is hardest to defeat but not invincible from the past results, and Flash is no surprise in there.

Firefox is not a target this year. Brian Gorenc, one of the contest organisers at HP said that "We wanted to focus on the browsers that have made serious security improvements in the last year". In other words, Firefox didn't improve its security :D

Source: Pwn2Own Hacking Contest Returns as Joint HPE-Trend Micro Effort
 
H

hjlbx

Do you seriously think that all those "exploits researchers" will give all their finding when those finding can give them more "incomes" than the prizes :rolleyes:

Zero-day exploit can be sold for a lot of money in the cyber-underground.
 
  • Like
Reactions: kev216
D

Deleted member 178

Zero-day exploit can be sold for a lot of money in the cyber-underground.

exactly my point. every new exploits cost thousands of dollars to one buyer, now imagine 10 000 buyers; this contest's prize is ridiculous.
 
  • Like
Reactions: kev216
H

hjlbx

exactly my point. every new exploits cost thousands of dollars to one buyer, now imagine 10 000 buyers; this contest's prize is ridiculous.

Does anyone remember which zero-day that was reportedly sold for $500,000 - or was it $750,000 ? I think it was "sold back" to the vendor !
 
  • Like
Reactions: kev216

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top