The annual Pwn2Own hacking competition wrapped up its 2015 event in Vancouver with another banner year, paying $442,000 for 21 critical bugs in all four major browsers, as well as Windows, Adobe Flash, and Adobe Reader.
The crowning achievement came Thursday as contestant Jung Hoon Lee, aka lokihardt, demonstrated an exploit that felled both the stable and beta versions of Chrome, the Google-developed browser that's famously hard to compromise. His hack started with a buffer overflow race condition in Chrome. To allow that attack to break past anti-exploit mechanisms such as the sandbox and address space layout randomization, it also targeted an information leak and a race condition in two Windows kernel drivers, an impressive feat that allowed the exploit to achieve full System access.
(Score: 5, Interesting) by K_benzoate on Sunday March 22 2015, @12:56AM
And how many of these attacks only work if scripting/plugins are enabled? Letting every site you wander onto run code in your browser is insane, and it's even more insane that we've conditioned normal people into expecting functionality that requires it.
Climate change is real and primarily caused by human activity.
(Score: 5, Interesting) by CirclesInSand on Sunday March 22 2015, @02:21AM
It's not the code that matters (for security) as much as the side effects. It doesn't bother me so much that generalized program commands are running, it's the access that they have that is frightening. Popup windows, execute on close, microphone/camera integration, that's just a start. Combine that with plugin privileges being all-or-nothing rather than well defined and itemized, it's not the turing completeness that matters; it's the security that was decided by sellouts to advertisers and con artists.
(Score: 1, Informative) by Anonymous Coward on Sunday March 22 2015, @03:02AM
Looks like the firefox one is in the svg render.
https://www.mozilla.org/en-US/security/advisories/mfsa2015-28/ [mozilla.org]
The second one was in javascript
https://www.mozilla.org/en-US/security/advisories/mfsa2015-29/ [mozilla.org]
MOST people enable javascript at one point or another. Even if they use noscript.
(Score: 1, Insightful) by Anonymous Coward on Sunday March 22 2015, @06:24AM
It's also harder to steal your car if you take off one of the wheels.
(Score: -1, Redundant) by Anonymous Coward on Sunday March 22 2015, @09:58AM
Or if you pull the fuses when you park... something I used to do in my student days.
I also disable JavaScript and consider sites that require it broken.
(Score: 0) by Anonymous Coward on Sunday March 22 2015, @02:13PM
And how many of these attacks only work if scripting/plugins are enabled?
More importantly, how many only work on Windows?
EG, " it also targeted an information leak and a race condition in two Windows kernel drivers"