Perimeter
7/30/2009
02:01 PM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

Pwnie Awards Bring Fame And Shame

The third annual Pwnie Awards at Black Hat in Las Vegas, hosted by Alex Sotirov, Dino Dai Zovi, HD Moore, Halvar Flake, and Rich, celebrated the highs and lows in the security industry. As Dino said, "First we reward for great work, then we shame."

The third annual Pwnie Awards at Black Hat in Las Vegas, hosted by Alex Sotirov, Dino Dai Zovi, HD Moore, Halvar Flake, and Rich, celebrated the highs and lows in the security industry. As Dino said, "First we reward for great work, then we shame."I had a blast, and the presenters obviously enjoyed themselves when presenting each award, which are My Little Ponies that have been painted gold (picture on Pwnie Awards site). The presenters took the time to describe each nominee in detail, and it was interesting to hear the thoughts of the experts as they covered each one.

Alex noted that all of the nominees came from people in the industry and that several of the judges received nominations but had to disqualify themselves because of obvious reason.

Adobe received a lot of abuse for their repeated failures this year with Acrobat and Flash vulnerabilities, and as Dino so aptly pointed out it's a reader, it doesn't need to write to the file system.

The results will be posted to the Pwnie Awards site later today, but here is the unofficial list. (UPDATE: The Pwnie site has been updated with the winners.)

    Best Server-Side Bug - Linux SCTP FWD Chunk Memory Corruption

    Best Client-Side Bug - msvidctl.dll MPEG2TuneRequest Stack buffer overflow

    Best Privilege Escalation Bug - Linux udev Netlink Message Privilege Escalation

    Mass 0wnage - Red Hat Networks Backdoored OpenSSH Packages

    Most Innovative Research - From 0 to 0day on Symbian

    Lamest Vendor Response - Linux for continually assuming that all kernel memory corruption bugs are only Denial-of-Service

    - Juniper got an honorable mention for pulling Barnaby Jack's talk. Most Overhyped Bug

    - MS08-067 Server Service NetpwPathCanonicalize() Stack Overflow (CVE-2008-4250)

    Best Song - Nice Report by Doctor Raid

    Most Epic FAIL - Twitter Gets Hacked and the "Cloud Crisis"

    Lifetime Achievement Award - Solar Designer

John H. Sawyer is a senior security engineer on the IT Security Team at the University of Florida. The views and opinions expressed in this blog are his own and do not represent the views and opinions of the UF IT Security Team or the University of Florida. When John's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice post
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1750
Published: 2015-07-01
Open redirect vulnerability in nokia-mapsplaces.php in the Nokia Maps & Places plugin 1.6.6 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the href parameter to page/place.html. NOTE: this was originally reported as cross-sit...

CVE-2014-1836
Published: 2015-07-01
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.

CVE-2015-0848
Published: 2015-07-01
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.

CVE-2015-1330
Published: 2015-07-01
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vecto...

CVE-2015-1950
Published: 2015-07-01
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report