Four different research teams on Wednesday cracked four products–Adobe Flash, Reader, Mozilla Firefox, and Microsoft Internet Explorer—and collectively earned a payout of $317,000 on the first day of Pwn2Own 2015.
The annual hacking contest, which kicked off Wednesday in Vancouver, runs concurrently with CanSecWest and is hosted by HP’s Zero Day Initiative and Google’s Project Zero.
The group of Chinese hackers that took down Flash last year, KeenTeam, targeted Flash once again yesterday. Alongside Zeguang Zhao, a researcher working under the guise of Team509, KeenTeam’s Peter Hlavaty, Jihui Lu, and Wu Shi exploited Flash running on a 64-bit Windows machine by using a heap overflow vulnerability, then used a local privilege escalation bug in the Windows kernel via TrueType fonts to bypass its defensive measures.
The four researchers earned $60,000 for the Flash hack, which took all of 30 seconds, and an extra $25,000 for the escalation bug.
Nicolas Joly, formerly of the French exploit vendor Vupen, took down Flash with a use-after-free vulnerability and a sandbox escape directory traversal vulnerability,
Mariusz Młyński, a security researcher from Poland who used two vulnerabilities to gain privilege escalation in Firefox 27 last year, targeted the browser again this year.
Młyński earned $55,000 for digging up two bugs, a cross-origin vulnerability that eventually led to privilege escalation, all within the span of .542 seconds.
According to HP Security Research’s Dustin Childs there was a fundamental Windows flaw that figured into Młyński’s Firefox hack and that Microsoft has been notified of the vulnerability.
A new entrant in the competition, JungHoon Lee, working with 360Vulcan Team, broke a 64-bit version of Internet Explorer 11 with an uninitialized memory vulnerability to earn $32,500.
Source : Threatpost