Researchers hack Internet Explorer 11 and Chrome at Mobile Pwn2Own

Previously unknown vulnerabilities in the two browsers were exploited to fully compromise Windows 8.1 and Android mobile devices

Security researchers have compromised Microsoft Surface RT, Nexus 4 and Samsung Galaxy S4 devices by exploiting previously unknown vulnerabilities in Internet Explorer 11 running on Windows 8.1 and Google Chrome running on Android.

The exploits were demonstrated during the Mobile Pwn2Own hacking contest that ran Wednesday and Thursday at the PacSec Applied Security Conference in Tokyo.

Researchers Abdul Aziz Hariri and Matt Molinyawe from Hewlett-Packard's Zero Day Initiative (ZDI) team, which organized the contest, demonstrated an Internet Explorer 11 exploit on a Microsoft Surface RT device running Windows 8.1.

"Exploiting a bug in IE is difficult in general because of the protections and security controls they've implemented," Hariri said. The vulnerability was exploited twice in order to leak a memory address and then gain remote code execution, "which gave us full control over the whole machine," he said.

The vulnerability was reported to Microsoft so the company can protect users, Molinyawe said.

Another researcher who uses the pseudonym Pinkie Pie compromised Nexus 4 and Samsung Galaxy S4 devices by exploiting a vulnerability in Chrome.

Achieving remote code execution through a Chrome vulnerability is considered very difficult because of the application sandbox that separates the browser's processes from the operating system.

There have been only a handful of Chrome sandbox escape exploits demonstrated over the years and most of them were presented by researchers at hacking contests. Pinkie Pie hacked Chrome's sandbox two times before in 2012 as part of Google's Pwnium contests.

The researcher's new Chrome exploit chained together an integer overflow vulnerability and a sandbox escape one, earning him a prize of US$50,000.

The standard prize for compromising a mobile device through a Web browser at Mobile Pwn2Own was $40,000, but the Google Chrome Security Team offered a $10,000 bonus if the hacked browser was Chrome running on Nexus 4 or Samsung Galaxy S4.

Pinkie Pie secured the win by demonstrating his exploit on Nexus 4, but then for show, he repeated the feat on Samsung Galaxy S4.

In order for the attack to work the potential victim has to click on a link to a specifically crafted Web page sent via email, SMS or found on another website. Once the malicious page is opened in Chrome, the attack executes without any other user interaction and allows arbitrary code execution on the operating system.

As the contest rules dictate, the vulnerabilities exploited by Pinkie Pie were reported to Google so they can be fixed.

The Mobile Pwn2Own contest ended with participating researchers winning $117,500 out of a prize pool of over $300,000.

A team of security researchers from Japanese company Mitsui Bussan Secure Directions hacked into a Samsung Galaxy S4 device by exploiting vulnerabilities in unnamed applications pre-installed on the device by the manufacturer. A team of Chinese researchers hacked into two iPhone 5 devices running iOS 7.0.3 and iOS 6.1.4 respectively by exploiting vulnerabilities in Safari.

The Japanese team won $40,000 because their attack resulted in a full compromise of the device, and the Chinese team won $27,500 because their attack resulted in theft of data, like session cookies, photos and contacts.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags samsungGoogleMicrosoftsecurityMobile OSesmobileExploits / vulnerabilitiesHewlett-Packard

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?