Safari, Chrome and Flash Player hacked during first day at Pwn2Own, some of them twice

Hackers take home $282,500 on the contest's first day

Security researchers exploited previously unknown vulnerabilities in Apple Safari, Google Chrome and Flash Player to compromise the latest versions of OS X and Windows during the first day of the annual Pwn2Own hacking contest.

On Wednesday, four teams and a researcher who competed on his own made six attempts to hack this year's targets: Safari running on OS X, Chrome running on Windows, Microsoft Edge running on Windows and Flash Player on Windows. Four attempts were successful, one was only partially successful and one failed.

The 360Vulcan Team from Chinese Internet security company Qihoo 360 combined a remote code execution vulnerability in Flash Player with a vulnerability in the Windows kernel to gain system privileges. For this feat, they received a US$80,000 prize, $60,000 for the Flash Player exploit and a $20,000 bonus for the system-level escalation.

Later in the day, the same team demonstrated a remote code execution attack against Google Chrome on Windows that members also managed to escalate to system. For that attack, they combined exploits for four vulnerabilities: one in Chrome, two in Flash and one in the Windows kernel.

The attack was considered only a partial win, because the Chrome flaw had previously been reported to Google by an independent researcher without the team's knowledge, so it didn't qualify as a zero-day. The team still won $52,500, putting their first-day payout at $132,500.

South Korean researcher JungHoon Lee, known in hacking circles as lokihardt, demonstrated a remote code execution attack against Apple Safari on OS X with an escalation to root privileges. He also combined four vulnerabilities, earning a $60,000 prize.

This year, Safari exploits are rewarded with $40,000, compared to $60,000 for Chrome and Microsoft Edge on Windows. The privilege escalation bonus of $20,000 is available for both Windows and OS X.

It's worth noting that during last year's edition of Pwn2Own, JungHoon Lee was the most successful contestant, taking home $225,000, almost half of the total payout.

He still has time to come on top this year, too, because he was scheduled to attempt attacks against Chrome and Microsoft Edge on Thursday, the contest's second day. Meanwhile, 360Vulcan Team, which is currently in the lead, has no other demonstrations scheduled.

Chinese Internet giant Tencent has three teams in the contest, with members from several of its subsidiaries.

During the first day, Tencent Security Team Shield demonstrated an attack against Safari to achieve root-level code execution. The exploit combined two vulnerabilities, one in Safari and one in another privileged process, and earned the team $40,000.

Meanwhile, Tencent Security Team Sniper demonstrated an attack against Flash Player on Windows that involved privilege escalation to system, for which the group received $50,000.

The third Tencent team, Xuanwu Lab, tried an exploit against Adobe Flash in Microsoft Edge, but it failed to work.

During the first day, security researchers won $282,500 and disclosed 15 previously unknown vulnerabilities. The exploits were shared with contest organizers from the Zero Day Initiative, which is now part of Trend Micro, and will be reported to the affected vendors. 

This year, the Pwn2Own contest is sponsored by Trend Micro and Hewlett Packard Enterprise and has a total prize pool around $600,000.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Father’s Day Gift Guide

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?