Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Saturday March 21 2015, @11:02PM   Printer-friendly
from the lynx-FTW dept.

The annual Pwn2Own hacking competition wrapped up its 2015 event in Vancouver with another banner year, paying $442,000 for 21 critical bugs in all four major browsers, as well as Windows, Adobe Flash, and Adobe Reader.

The crowning achievement came Thursday as contestant Jung Hoon Lee, aka lokihardt, demonstrated an exploit that felled both the stable and beta versions of Chrome, the Google-developed browser that's famously hard to compromise. His hack started with a buffer overflow race condition in Chrome. To allow that attack to break past anti-exploit mechanisms such as the sandbox and address space layout randomization, it also targeted an information leak and a race condition in two Windows kernel drivers, an impressive feat that allowed the exploit to achieve full System access.

[Related]: http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2015-Day-Two-results/ba-p/6722884#.VQwyVuF7S_Y

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Interesting) by K_benzoate on Sunday March 22 2015, @12:56AM

    by K_benzoate (5036) on Sunday March 22 2015, @12:56AM (#160918)

    And how many of these attacks only work if scripting/plugins are enabled? Letting every site you wander onto run code in your browser is insane, and it's even more insane that we've conditioned normal people into expecting functionality that requires it.

    --
    Climate change is real and primarily caused by human activity.
    Starting Score:    1  point
    Moderation   +3  
       Insightful=1, Interesting=3, Overrated=1, Total=5
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 5, Interesting) by CirclesInSand on Sunday March 22 2015, @02:21AM

    by CirclesInSand (2899) on Sunday March 22 2015, @02:21AM (#160933)

    It's not the code that matters (for security) as much as the side effects. It doesn't bother me so much that generalized program commands are running, it's the access that they have that is frightening. Popup windows, execute on close, microphone/camera integration, that's just a start. Combine that with plugin privileges being all-or-nothing rather than well defined and itemized, it's not the turing completeness that matters; it's the security that was decided by sellouts to advertisers and con artists.

  • (Score: 1, Informative) by Anonymous Coward on Sunday March 22 2015, @03:02AM

    by Anonymous Coward on Sunday March 22 2015, @03:02AM (#160947)

    Looks like the firefox one is in the svg render.

    https://www.mozilla.org/en-US/security/advisories/mfsa2015-28/ [mozilla.org]

    The second one was in javascript
    https://www.mozilla.org/en-US/security/advisories/mfsa2015-29/ [mozilla.org]

    MOST people enable javascript at one point or another. Even if they use noscript.

  • (Score: 1, Insightful) by Anonymous Coward on Sunday March 22 2015, @06:24AM

    by Anonymous Coward on Sunday March 22 2015, @06:24AM (#161007)

    It's also harder to steal your car if you take off one of the wheels.

    • (Score: -1, Redundant) by Anonymous Coward on Sunday March 22 2015, @09:58AM

      by Anonymous Coward on Sunday March 22 2015, @09:58AM (#161037)

      Or if you pull the fuses when you park... something I used to do in my student days.

      I also disable JavaScript and consider sites that require it broken.

  • (Score: 0) by Anonymous Coward on Sunday March 22 2015, @02:13PM

    by Anonymous Coward on Sunday March 22 2015, @02:13PM (#161112)

    And how many of these attacks only work if scripting/plugins are enabled?

    More importantly, how many only work on Windows?

    EG, " it also targeted an information leak and a race condition in two Windows kernel drivers"