Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Bug Security

Pwn2Own Competitors Crack Tesla, Firefox, Safari, Microsoft Edge, and Windows 10 (zdnet.com) 41

A research duo who hacked a Tesla were the big winners at the annual Pwn2Own white hat security contest, reports ZDNet. "The duo earned $375,000 in prize money, of the total of $545,000 awarded during the whole three-day competition... They also get to keep the car." Team Fluoroacetate -- made up of Amat Cama and Richard Zhu -- hacked the Tesla car via its browser. They used a JIT bug in the browser renderer process to execute code on the car's firmware and show a message on its entertainment system... Besides keeping the car, they also received a $35,000 reward. "In the coming days we will release a software update that addresses this research," a Tesla spokesperson told ZDNet today in regards to the Pwn2Own vulnerability.

Not coincidentally, Team Fluoroacetate also won the three-day contest after earning 36 "Master of Pwn" points for successful exploits in Apple Safari, Firefox, Microsoft Edge, VMware Workstation, and Windows 10... [R]esearchers also exploited vulnerabilities in Apple Safari, Microsoft Edge, VMware Workstation, Oracle Virtualbox, and Windows 10.

This discussion has been archived. No new comments can be posted.

Pwn2Own Competitors Crack Tesla, Firefox, Safari, Microsoft Edge, and Windows 10

Comments Filter:
  • by Anonymous Coward on Saturday March 23, 2019 @10:04PM (#58323018)

    Besides keeping the car, they also received a $35,000 reward.

    That's nothing... the ones who cracked Firefox got a free copy of Firefox. But the worst deal of all were the ones who cracked Win10, for they were obligated to accept a copy of Win10. Perhaps they'll read the terms and conditions more carefully next time. Live and learn.

  • $300,000 for Cracking Telegram Encryption [telegram.org]. How about that challenge?
  • Is it the quality of the OS?
    The code used the software is created in?
    The skill sets needed to make a browser?
    More testing needed?
    Better testing?
    Would something like Ada ensure better software?
    • The complexity hidden behind these apparently simple and easy to use programs.
    • by Anonymous Coward

      You get what you pay for. I write secure code. Unit tested & input fuzzed. I use a different more secure paradigm than typical C / C++ function call stacks (which put parameters & code pointers on the stack), None of my heap stores pointers to functions or v-tables. I employ hardware memory RW controls to ensure there are is no return oriented programming, stack smashing or heap exploits (my custom memory allocator keeps all record keeping data in read only memory unless a thread is in the alloc

  • Peasy...
  • The last time they had a browser hack the hackers could control breaks, do they have a decent hardware firewall in place now or is it still a shitshow?

I've noticed several design suggestions in your code.

Working...