Lesson From Pwn2Own: Focus On Exploitability

Talented programmers can create attack code quickly, suggesting that firms need to focus on patching easily exploitable -- not just exploited -- flaws

Dark Reading Staff, Dark Reading

March 29, 2012

3 Min Read

The Pwn2Own contest earlier this month at the CanSecWest Conference showed off the speed with which knowledgeable security professionals can code exploits for known vulnerabilities.

While only two teams competed, it took them less than a day to create a workable exploit for each vulnerability selected by HP TippingPoint, which ran the competition. In some cases, the coders required only an hour or two. On the second day of the contest, for example, a team of researchers from security and offensive technology firm VUPEN boasted on Twitter: "Here we go, another on-site exploit have been written by our team for IE (Internet Explorer) -- this one was challenging, it took us 4 hrs."

The speed that vulnerabilities could be exploited holds a lesson. While vulnerabilities that are actively being exploited should receive the highest priority for patching, the contest shows that the exploitability of a vulnerability -- not just the existence of an exploit -- should be considered as well, says Aaron Portnoy, manager of security research for HP TippingPoint.

"The whole point of the public exploit part of Pwn2Own is to show that, yes, it really doesn't take that long to write an exploit for these," Portnoy says. "Before the contest, there really wasn't any good data on how long it takes for someone to code an exploit. People now actually have that information."

While patching is an important security task, companies are overwhelmed by the deluge of vulnerabilities that they have to track on a regular basis, Portnoy says. Finding some metric to help prioritize which updates to test and deploy is important. While some researchers have suggested a focus on finding weaknesses in attack tools or attacker methodology that can inform defense, the working security manager needs a more immediate indicator of patch criticality.

Companies should obviously patch software that is being targeted by a publicly available exploit, Portnoy says. Yet, after emergency fixes, focusing on software vulnerabilities that vendors expect to be exploited quickly is the next step. The performance of teams such as VUPEN's at Pwn2Own shows that it doesn't take long to go from zero to exploit.

"We created six different exploits in less than 24 hours, which demonstrates that with enough resources and expertise, a team of motivated researchers can write reliable exploits in a very short time," says Chaouki Bekrar, CEO and head of research for VUPEN.

Moreover, companies need to assume that attackers may have already created attacks that use easy-to-exploit vulnerabilities and just have not released the details publicly, Bekrar says.

"As functional exploits are often privately available but not public, companies should not take into account the availability ... of a public exploit in their patch management process," he says.

One major caveat: The systems that Pwn2Own contestants pitted themselves against were not the most secure. The contest used older versions of the targeted operating systems to make coding the exploits easier. Windows XP and the older version of the Mac OS X used in the competition did not have the same software hardening features, such as sandboxing and address space layout randomization (ASLR), built into the more modern version of those operating systems.

"If they were going to go after a real target, they will have to overcome a lot of mitigation," HP TippingPoint's Portnoy says.

Yet VUPEN's demonstration of successful attacks against Chrome and Internet Explorer suggests that companies would be best-served by assuming attackers have the ability to overcome operating system defenses.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights