Vulnerabilities / Threats
3/7/2013
11:17 AM
50%
50%

Java, Browsers, Windows Security Defeated At Pwn2Own

How secure are the latest versions of Chrome, Firefox and IE10? All were successfully exploited on the first day of the annual Pwn2Own contest.

Anonymous: 10 Things We Have Learned In 2013
Anonymous: 10 Things We Have Learned In 2013
(click image for larger view and for slideshow)
The annual Pwn2Own hacking contest has proven once again that not even the latest bug-proofed versions of Java 7, Internet Explorer 10, Google Chrome and Mozilla Firefox can withstand determined hackers motivated by greed, in this case $280,000 in prize money.

Security researchers demonstrated exploits in all of those high-profile programs Wednesday at the CanSecWest 2013 conference in Vancouver as part of the annual Pwn2Own competition hosted by HP's DVLabs Zero Day Initiative (ZDI), and which continues Thursday and Friday.

"VUPEN pwned Mozilla Firefox using a UaF [use-after-free vulnerability] plus a new Windows 7 ASLR/DEP bypass technique then pwned Oracle Java with a heap overflow," read a tweet from the Zero Day Initiative (ZDI). French vulnerability seller Vupen also exploited IE10 running on Windows 8, while researchers James Forshaw and Joshua Drake each demonstrated a different exploit against Java 7, and "Nils & Jon" took down Chrome.

[ Are China and U.S. hacking each other? China Targets U.S. In Hacking Blame Game. ]

Preregistered contestants for Thursday include Vupen, which said it will demonstrate a new Flash exploit. Also, George Hotz plans to own Adobe Reader, while Pham Toan will take down IE10 running on Windows 8.

The contest offers prizes for exploiting Google Chrome on Windows 7 ($100,000), IE 10 on Windows 8 ($100,000), IE 9 on Windows 7 ($75,000), Mozilla Firefox on Windows 7 ($60,000) and Apple Safari on OS X Mountain Lion ($65,000). Also offered are prizes for exploiting Adobe Reader XI ($70,000), Adobe Flash ($70,000) or Oracle Java ($20,000).

In the run-up to Pwn2Own, browser developers typically push a flurry of last-minute updates to fix every last possible vulnerability they can get their hands on, because contestants must exploit the latest versions of any targeted application or operating system: "The targets will be running on the latest, fully patched version of the Windows 7, 8, and OS X Mountain Lion. All targets will be installed in their default configurations, as this is how a majority of users will have them configured," say the contest rules. "As always, the vulnerabilities utilized in the attack must be unknown and not previously reported to the vendor. If a sandbox is present, a full sandbox escape is required to win. A given vulnerability may only be used once across all categories."

This year, ZDI expanded the contest to not just reward browser exploits but also exploits of browser plug-ins. It said the change reflects the speed with which attackers and exploit kits now attack not just browser flaws, but also bugs in browser plug-ins.

ZDI also altered the contest rules surrounding disclosure, saying that awarding prize money would be contingent on it being allowed to purchase "all successful vulnerabilities and exploits from pre-registered contestants." To make that attractive to participants -- given the bounties that zero-day bugs and exploits can fetch on the open market -- ZDI upped the total prize money to over half a million dollars.

But the prize money on offer is reportedly still a fraction of what a top-notch exploit commands on the open market. Accordingly, why bother participating?

SecurityWeek's Ryan Naraine put that question to Chaouki Bekrar, CEO of Vupen, which fielded employees who successfully exploited the latest version of Microsoft Internet Explorer 10 running on Windows 8, using an exploit that silently bypassed all built-in attack-mitigation techniques, including DEP and ASLR, as well as the IE10 sandbox. Bekrar replied that his goal was to advertise his business's skill at creating "weaponized exploits."

"The aim for us by coming here to Pwn2Own is to show that even the newest technologies, the newest operating systems, the newest browsers, can get pwned," he said.

In previous years, the prize money associated with Pwn2Own wouldn't have made financial sense, he said, but the increase in prize money this year made the firm reconsider. "We don't usually accept to share techniques, we can accept to share zero days," Bekrar told SecurityWeek, noting that once an attack technique was shared, it would be of no more use to the company, since vendors would update their software to defend against it.

But Bekrar said that Vupen extensively searches for new exploits, saying that developing the IE10 exploit for Windows 8 took one or two full-time employees between two and three months of work. In the case of Windows 8, furthermore, Vupen began looking for vulnerabilities when the preview version was released about nine months ago, and Bekrar said the company now has related exploits to burn. "With IE10 and Windows 8, we have many vulnerabilities, so in fact even if we give this exploit and these techniques, we still have other things."

Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple Deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR03 by March 9 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology. Register for Interop today!

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.