The tenth meeting - hacker contest at Pwn2Own 2017 continues successfully. Products targeted by the teams included operating systems, programs περιήγησης στο Web, νέες applications Enterprise and server-side. The contest is run by Trend Micro Security and lasts for three days.
Adobe Reader and Apache Web Server were added as targets to the competition by its committee Pwn2Own 2017.
On the first day of Pwn2Own 2017, teams managed to successfully exploit vulnerabilities in Adobe Reader (twice), Apple Safari (twice), Microsoft Edge, and Ubuntu Desktop. Attacks against Google Chrome and Microsoft Windows failed.
On the second day, the teams managed to hit Adobe Flash (twice), Microsoft Edge (twice), Apple Safari, Mac OS X, Mozilla Firefox, and Windows successfully this time.
Other attacks against Firefox, Windows, Microsoft Edge, Mac OS X, failed, and were blocked.
The third day is expected to see three additional efforts against the following goals: Microsoft Edge (twice), and VMWare Workstation.
Pwn2Own 2017 The results so far:
On the operating system side, three different platforms have been successfully compromised: Windows, Mac OS X, and Ubuntu Desktop.
On the side of browsers, Microsoft Edge, Firefox and Safari have been successfully compromised. An attempt against Chrome failed, and a second attack against Firefox also failed. Both Edge and Apple's Safari have been exploited many times.
On the application side now, Adobe, Flash Player and Reader products have been (unsurprisingly) successfully broken many times.
The many times were a surprise infringementof Edge, which Microsoft cites as the most secure browser.
It should be noted that other browsers based on Chromium, such as Vivaldi or Opera were not among the products the teams chose to compete with.
You can see videos with the results of the first day below.
Additional information for this year's Pwn2Own contest is available on the blog TrendMicro Zero Day Initiative.