That's it Pwn2Own 2014, one event you are doing these days along with CanSecWest at Vancouver, he began. the theme είναι πως άρχισε. Από την πρώτη μέρα οι διαγωνιζόμενοι αποκάλυψαν vulnerabilities στο Safari, το Firefox,τον Internet Explorer, και κλασικά στο Adobe Flash και Reader.
Rewards for discovering vulnerabilities from day one have reached $ 400,000. Most of this money went to a French research firm VUPEN. The company's researchers managed to discover a total of four vulnerabilities.
They discovered one use-after-free on its sandbox Internet Explorer. Vulnerability can be used to execute arbitrary code. One Overflow with PDF in the Adobe reader sandbox can also be used to execute malicious code.
VUPEN experts also presented one use-after-free which can act as a lever to run malicious code on Firefox. They also managed to bypass the Windows 11 Internet Explorer 8.1 sandbox with a vulnerability use-after-free causing object confusion at the broker
VUPEN researchers received a total of $ 300,000.
Researchers Jüri Aedla and Mariusz Mlynski managed to hack Firefox. Aedla discovered one out-of-bound read / write can be used to run malicious code
Mlynski discovered two loopholes security : a privilege escalation flaw that could be exploited to bypass browser security measures. Each of the experts got $50.000.
The organizing initiative belongs to TippingPoint Zero Day Initiative (ZDI) and at Google, which, as co-sponsor of Pwn2Own 2014, took part in Pwn4Fun. Experts from Google and ZDi presented their own exploits, and all the proceeds to be made available for the Red Cross of Canada.
"At Pwn4Fun, Google presented a very impressive exploit for Apple's Safari. The exploit runs it Safari launching Calculator as a root on Mac OS X. ZDi has multiplied exploits, including a flexible bypass of the Internet Explorer sandbox, ”said the contest organizers.
82.500 dollars will be available on the Red Cross of Canada.