Pwn2Own hackers' conference: Firefox, Edge and Safari were all cracked
On the second day of the Pwn2Own 2018 hacker competition in Vancouver, Canada, Safari had been cracked twice. One team broke the browser defense line after three attempts within 30 minutes, and the other team also completed the cracking after four attempts. Currently, the results of Pwn2Own 2018 attacks against the Safari browser have been sent to the "Zero Day Initiative" page.
Alex Plaskett, Georgi gesev, and Fabi Beterke from MWR lab broke the sandbox mode of Safari through two vulnerabilities. One was the heap buffer overflow vulnerability in the browser, the other is the uninitialized stack variable vulnerability in macOS. The Team also earned nearly $55000 and 5 Pwn points. The second cracking team came from Ret2 Systems, where Markus Gaasedele, Nick Burnett, and Patrick Biernat went into battle. They used the macOS kernel privilege escalation vulnerability to attack Safari, however, after the fourth attempt, they used the vulnerability to crack the attack. In fact, the use of this vulnerability in the rules of this hacker competition is not really powerful, or even can be judged as a failure, but it is indeed within the scope of the competition, according to the normal ZDI program, the vulnerability will also be purchased and disclosed to Apple.
Richard Zhu is the winner of this competition. He earned a total of $0.12 million in the competition this year. After all, this year, Pwn2Own received a total prize of $2018. Although he failed to break the Safari browser due to timeout on the first day of Pwn2Own 2018, he then successfully used the Windows core EoP Vulnerability to break the Firefox browser, so he also received a $50 thousand bonus and 5 Pwn points. In addition, in the browser area, he also used the UAF vulnerability to break the Edge browser and took away the $70 thousand prize.
This article permanently updates link: https://www.bkjia.com/Linux/2018-03/151530.htm