That's it Pwn2Own 2014, one event you are doing these days along with CanSecWest at Vancouver, he began. the point is how it started. From day one, contestants exposed vulnerabilities in Safari, Firefox, the Internet Explorer, and classic in Adobe Flash and Reader.
The payments – bounties for the discovery of vulnerabilities since the first day reached 400,000 dollars. Most of the money these went to French research company VUPEN. The company's researchers managed to discover a total of four vulnerabilities.
They discovered one use-after-free on its sandbox Internet Explorer. The vulnerability could be used to execute arbitrary code. One Overflow with PDF in the Adobe reader sandbox can also be used to execute malicious code.
VUPEN experts also presented one use-after-free which can act as a lever to execute malicious code in Firefox. Additionally they managed to bypass the Internet Explorer 11 sandbox of their Windows 8.1 with a vulnerability use-after-free causing object confusion at the broker
VUPEN researchers received a total of $ 300,000.
Researchers Jüri Aedla and Mariusz Mlynski managed to hack Firefox. Aedla discovered one out-of-bound read / write can be used to run malicious code
Mlynski discovered two security gaps: a privilege escalation flaw that could be exploited to bypass the browser's security measures. Each of the experts took from 50.000 dollars.
The organizing initiative belongs to TippingPoint Zero Day Initiative (ZDI) and Google, which, as co-sponsor of Pwn2Own 2014, took part in Pwn4Fun. Experts from Google and ZDi presented their own exploits, and all the proceeds to be made available for the Red Cross of Canada.
"At Pwn4Fun, Google presented a very impressive exploit for Apple's Safari. The exploit runs it Safari launching Calculator as a root on Mac OS X. ZDi has multiplied exploits, including a flexible bypass of the Internet Explorer sandbox, ”said the contest organizers.
82.500 dollars will be available on the Red Cross of Canada.