That's it Pwn2Own 2014, one event you are doing these days along with CanSecWest at Vancouver, began. the issue is how it started. From day one, contestants revealed vulnerabilities in Safari, Firefox, Internet Explorer, and classics in Adobe Flash and Reader.
The payments – bounties for the discovery of vulnerabilities since the first day reached 400,000 dollars. Most of the money these went to French research company VUPEN. The company's researchers managed to discover a total of four vulnerabilities.
They discovered one use-after-free on its sandbox Internet Explorer. The vulnerability can be used to implementation arbitrary code. One Overflow with PDF in the Adobe reader sandbox can also be used to execute malicious code.
VUPEN experts also presented one use-after-free which can act as a lever to run malicious code on Firefox. They also managed to bypass the Windows 11 Internet Explorer 8.1 sandbox with a vulnerability use-after-free causing object confusion at the broker
VUPEN researchers received a total of $ 300,000.
Researchers Jüri Aedla and Mariusz Mlynski managed to hack Firefox. Aedla discovered one out-of-bound read / write can be used to run malicious code
Mlynski discovered two loopholes security : a privilege escalation flaw that could be exploited to bypass program security measures tours. Each of the experts got $50.000.
The organizing initiative belongs to TippingPoint Zero Day Initiative (ZDI) and Google, which, as co-sponsor of Pwn2Own 2014, took part in Pwn4Fun. Experts from Google and ZDi presented their own exploits, and all the proceeds to be made available for the Red Cross of Canada.
"At Pwn4Fun, Google presented a very impressive exploit for Apple's Safari. The exploit runs it Safari launching Calculator as a root on Mac OS X. ZDi has multiplied exploits, including a flexible bypass of the Internet Explorer sandbox, ”said the contest organizers.
82.500 dollars will be available on the Red Cross of Canada.