Pwn2Own hackers' conference: Firefox, Edge and Safari were all cracked

Source: Internet
Author: User

Pwn2Own hackers' conference: Firefox, Edge and Safari were all cracked

On the second day of the Pwn2Own 2018 hacker competition in Vancouver, Canada, Safari had been cracked twice. One team broke the browser defense line after three attempts within 30 minutes, and the other team also completed the cracking after four attempts. Currently, the results of Pwn2Own 2018 attacks against the Safari browser have been sent to the "Zero Day Initiative" page.

Alex Plaskett, Georgi gesev, and Fabi Beterke from MWR lab broke the sandbox mode of Safari through two vulnerabilities. One was the heap buffer overflow vulnerability in the browser, the other is the uninitialized stack variable vulnerability in macOS. The Team also earned nearly $55000 and 5 Pwn points. The second cracking team came from Ret2 Systems, where Markus Gaasedele, Nick Burnett, and Patrick Biernat went into battle. They used the macOS kernel privilege escalation vulnerability to attack Safari, however, after the fourth attempt, they used the vulnerability to crack the attack. In fact, the use of this vulnerability in the rules of this hacker competition is not really powerful, or even can be judged as a failure, but it is indeed within the scope of the competition, according to the normal ZDI program, the vulnerability will also be purchased and disclosed to Apple.

Richard Zhu is the winner of this competition. He earned a total of $0.12 million in the competition this year. After all, this year, Pwn2Own received a total prize of $2018. Although he failed to break the Safari browser due to timeout on the first day of Pwn2Own 2018, he then successfully used the Windows core EoP Vulnerability to break the Firefox browser, so he also received a $50 thousand bonus and 5 Pwn points. In addition, in the browser area, he also used the UAF vulnerability to break the Edge browser and took away the $70 thousand prize.

This article permanently updates link: https://www.bkjia.com/Linux/2018-03/151530.htm

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.