Pwn2Own 2012 Set To Reveal More Browser Vulnerabilities Than In the Past 57
darthcamaro writes "In any given year, Slashdot always has stories about how a researcher hacked a browser in only a few minutes at the Pwn2own hacking challenge. This year the rules are a bit different, and instead of hackers winning for just one vulnerability, the rules allow for multiple vulnerabilities to be presented. The winner isn't the first one to hack a browser, but is the one that can hack the browser the most. 'In the past, due to the way the competition was architected, we had lots of sensationalist headlines, things like "Mac hacked in three seconds,"' said Aaron Portnoy, Manager of the Security Research Team at HP TippingPoint. 'We don't think that type of sensationalism was representative of all the research that was going on.'"
Re: (Score:2)
Re: (Score:1)
Truth be told, Firefox was not hacked last year. Jus' sayin'.
Re: (Score:2)
Firefox is pretty much the least secure browser at this time.
Re: (Score:2)
Actually an extremely good point (Score:5, Insightful)
Re:Actually an extremely good point (Score:4, Insightful)
Re:Actually an extremely good point (Score:5, Funny)
It does if he has a gun pointed to his head while getting a blow job.. man that was an awful film..
Re: (Score:2)
It may have been an awful film from a technical perspective... but that was one hell of an interview process.
Re: (Score:2)
If the exploit works by the user viewing a web page, an exploit which requires the user to view the web page for 3 seconds is significantly more powerful than an exploit which requires the user to view the web page for an hour.
I know that the exploits are more proff of concept, and that the hour long exploit may (or may not) be capable of running faster. But time to exploit is still not totally irrellevant.
Re: (Score:3, Insightful)
It gets even more ridiculous when the Apple or Microsoft brand sudoku puzzle is the first one scheduled to be solved and everyone screams about how this is proof that those puzzles are easier to solve than the Mozilla or Google brand puzzles.
And yeah, this has happened in previous years, Safari scheduled to be attacked first so the media and anti-Apple people online scream about how Safari is the least secure browser because it was broken "first" (even though if you look at the event schedule this obviously
Re:Actually an extremely good point (Score:4, Interesting)
I dont suppose that you've considered that Safari gets broken first and fastest because there are a lot of undiscovered exploits, due largely to the fact that no-one targets safari as a browser due to low usage. Pwn2Own requires an entirely new exploit (otherwise I'm sure IE would be down in a number of nanoseconds)
BTW, Safari was not simply broken first, it was broken fastest, this is important as you pointed out the demonstrations took place at different times.
IE, Chrome and Firefox all have larger user bases, it stands to reason that they will have fewer undiscovered exploits then Safari because they are targeted more often.
Re:Actually an extremely good point (Score:4, Insightful)
Shush, this is Slashdot. Marketshare and userbase are never factors.
Re: (Score:1)
Pwn2Own requires an entirely new exploit (otherwise I'm sure IE would be down in a number of nanoseconds)
Actually that's one of the changes, they no longer require a zero day:
In a new twist, Pwn2Own 2012 will also be taking aim at known vulnerabilities. These are browser issues that were disclosed at some point in the past year, but do not yet have a public exploit. The researchers will need to actually exploit the given vulnerability in order to score additional points.
So if an vulnerability exists but has not been shown to be exploitable, if you can show that it is, you get points.
Re: (Score:2)
Safari is still based on WebKit which also runs Chrome, Konqueror, Android and a host of other commercial and open source browsers.
Re:Actually an extremely good point (Score:4, Interesting)
Possible, but given it's Pwn2Own, the machine you "pwned" is the machine you win.
And given in the past you had a choice of Macbook Pro (OS X), a Sony Vaio (Windows) and sometihng else (for Linux), and had the ability to choose what computer you wanted, what would you go for?
Most would go for the Macbook purely because it's a nice decent machine that happens to look and function great (and runs Windows and Linux). If I had a series of exploits that worked on all three platforms, I'd go after the Mac first just to win that over a Sony. Then I'd go for the Sony next (if it wasn't for the crapware, at least they're nice looking machines).
Once that was won, people concentrated on the next machine that was second on their list, etc. Smart contestants go after the computer no one is breaking in as they have a greater chance of winning a free computer.
And despite the /. crowd chanting "FUNCTION FIRST, not form", most people seem to consistently go for the Macs.
Given the machines are all around the same value, perhaps a fairer comparison would be if everyone of them was a Macbook Pro or so, running the OS of choice (after all, Windows and Linux run great on a Macbook Pro - I know Ubuntu has a EFI installer that boots natively).
Re: (Score:2)
you had a choice of Macbook Pro (OS X), a Sony Vaio (Windows) and sometihng else (for Linux) ... /. crowd chanting "FUNCTION FIRST, not form", most people seem to consistently go for the Macs.
And despite the
And despite what most people seem to consistently do, last time I blew a tidy sum on a laptop, I bought a Sony Vaio.
As you said... nice machine, after the crapware was cleaned up a bit.
Re: (Score:2)
I'd go after the Mac first just to win that over a Sony.
Living the dream. Owning apple and sony products with out giving them a single dime!
Linux natively on Macs problematic (Score:1)
Matthew Garrett recommends against (natively) running Linux on Macs [dreamwidth.org] and as he is one of the developers active on Linux EFI/UEFI [dreamwidth.org] related stuff that would be required to natively boot Linux on a Mac...
Re:Actually an extremely good point (Score:5, Interesting)
Safari scheduled to be attacked first so the media and anti-Apple people online scream about how Safari is the least secure browser because it was broken "first"
The schedule is not relevant, the Mac was hacked in the shortest amount of time which is why we say it was hacked "first".
And what pissed all you fanboys off wasn't how fast it got hacked, but the statement by the hacker that he chose the Mac because "it was the easiest to compromise quickly".
If Apple would stop its misleading marketing campaign, and if Apple's users would stop with the constant "Derp derp my Mac is 100% immune to any and all malicious activity of any kind" then we wouldn't laugh at your ass all the time.
Re: (Score:2)
And what pissed all you fanboys off wasn't how fast it got hacked, but the statement by the hacker that he chose the Mac because "it was the easiest to compromise quickly".
Skip the ad hominems, will you?
And most complaints were about the media blowing this out of proportion while leaving details out (I've seen lots of pwn2own reports in the media where it was basically stated "the first browser to get hacked was Apple's Safari raising concerns that blablabla..." with no mention of the fact that this was not a "everyone goes in blind and attacks the browser of their choice for the first time simultaneously" situation) and the anti-fanboys hollering about how this proved that e
Re: (Score:1)
Just looking at the stories from last year, it does seem like the order played into it. One story about IE8's exploit last year says:
The only other browser to fall Wednesday was Apple's Safari 5, which dropped to a team from French security company Vupen minutes before Fewer took his shot at IE8.
And really, the "Apple Hacked First" headlines will always get more attention than "IE Hacked First", so it does make business sense to have that one scheduled first to ensure the most clickable story gets out.
Re: (Score:1)
Re: (Score:1)
And yet the prize for winning the contest ... a shiny new MacBook Air. Go figure.
I love this argument. There was a 15k$ cash price to the winner in addition to the laptop. So you are claiming that the MacBook Air is so shiny that they would risk the 15k$ casch price by not going after the easiest target just to get it. RDF indeed.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Well, not just that, but, past entries have done what, written a file to disk and executed something like the calculator?
Big hairy deal. I'm not concerned until we see a mac drive by that also escalates to root.
Re: (Score:3)
Nothing on my computer I care about, needs root privileges to access.
Re: (Score:2)
Also helps with vulnerability hoarding (Score:5, Informative)
I heard that it's been the case before that discovered vulnerabilities would be kept secret so that they could be used across multiple years. This changes the incentive to reward whoever's found the most, which is what the point was all along - exposing as many vulnerabilities as possible.
Re:Also helps with vulnerability hoarding (Score:4, Interesting)
As well, all contestants should reveal all techniques they intend to use a part of their application. All these reports would be provided to the vendors after the competition.
Re: (Score:2)
As well, all contestants should reveal all techniques they intend to use a part of their application. All these reports would be provided to the vendors after the competition.
No-go, this exploits are worth a shit load of money on the black market. Unless you are willing to pay for the discovery all you will achieve is to push this people back in the underground and while you don't know how they work, at least you know they are out there.
My plan (Score:2, Funny)
1. Hack the browser once using a single vulnerability.
2. Install lots of new vulnerabilities on the compromised machine.
3. Win the contest by exploiting each of those vulnerabilities.
4. PROFIT!!!
Re: (Score:2)
Sensationalist headlines (Score:2)
Linux refused for browser testing? (Score:1)
Where does it say you can't use Linux for browser testing?
The only targets are OS X Lion or Windows 7 (Score:4, Interesting)
Where does it say you can't use Linux for browser testing?
From the rules page [zerodayinitiative.com]:
The targets will be running on the latest, fully patched version of either Windows 7 or Lion.
Back in 2008, Linux was a available as a target in Pwn2Own [engadget.com] but in an interview Aaron Portnoy of TippingPoint explained that Linux is now not included in Pwn2Own to avoid controversy [internetnews.com].
No longer Linux (Score:2)
Re: (Score:3)
Since they no longer do it with Linux, who cares. Could it be that 2008 Firefox on Ubuntu was un-hacked? It's not good advertisement if a open source system can't be hacked, while the two commercial systems are hacked in seconds?
Last year neither firefox nor Chrome on Windows OS were hacked.
Re: (Score:2)
Mmm, that's odd, I have to agree.
Especially given that both HP and Google are funding it, one of which probably has an interest in a non-open OS being trounced by an open one, and the other of which supports both types of OS on its hardware (and isn't really "competing" or "allied" with Apple in those terms either).
Weird.