Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Hacker busts IE8 on Windows 7 in 2 minutes
ComputerWorld ^ | 25 March 2010 | Gregg Keizer

Posted on 03/26/2010 10:24:27 AM PDT by ShadowAce

Two researchers yesterday won $10,000 each at the Pwn2Own hacking contest by bypassing important security measures of Windows 7.

Both Peter Vreugdenhil of the Netherlands and a German researcher who would only identify himself by the first name Nils found ways to disable DEP (data execution prevention) and ASLR (address space layout randomization), which are two of Windows 7's most vaunted anti-exploit features. Each contestant faced down the fully-patched 64-bit version of Windows 7 and came out a winner.

Vreugdenhil used a two-exploit combination to circumvent first ASLR and then DEP to successfully hack IE8. A half-hour later, Nils bypassed the same defensive mechanisms to exploit Mozilla's Firefox 3.6. For their efforts, each was awarded the notebook they attacked, $10,000 in cash and a paid trip to the DefCon hackers conference in Las Vegas this July.

"Every exploit today has been top-notch," said Aaron Portnoy, security research team lead at 3Com's TippingPoint security unit, the sponsor of the contest, in an interview at the end of the day Wednesday. "The one on IE8 was particularly impressive."

Vreugdenhil, a freelance vulnerability researcher, explained how he bypassed DEP and ASLR. To outwit ASLR -- which randomly shuffles the positions of key memory areas to make it much more difficult for hackers to predict whether their attack code will actually run -- Vreugdenhil used a heap overflow vulnerability that allowed him to obtain the base address of a .dll module that IE8 loads into memory. He then used that to run his DEP-skirting exploit.

DEP, which Microsoft introduced in 2004 with Windows XP Service Pack 2, prevents malicious code from executing in sections of memory not intended for code execution and is a defense against, among other things, buffer-overflow attacks.

(Excerpt) Read more at computerworld.com ...


TOPICS: Computers/Internet
KEYWORDS: browser; hacking

1 posted on 03/26/2010 10:24:27 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

2 posted on 03/26/2010 10:24:44 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
"Windows XP Service Pack 2, prevents malicious code from executing in sections of memory not intended for code execution and is a defense against, among other things, buffer-overflow attacks"

Uh, or not.

3 posted on 03/26/2010 10:26:46 AM PDT by Paladin2
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

...build a better mousetrap...


4 posted on 03/26/2010 10:30:29 AM PDT by rockrr (Everything is different now...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paladin2

hmmm. Is computer world biased?

“iPhone, Safari, IE 8, Firefox hacked in CanSecWest contest”

http://news.cnet.com/8301-27080_3-20001126-245.html


5 posted on 03/26/2010 10:36:43 AM PDT by ColdWater ("The theory of evolution really has no bearing on what I'm trying to accomplish with FR anyway. ")
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce
Well it's not like Obama would ever put someone from Microsoft to put in charge of our nation's Cybersecurity...

Oh wait...

6 posted on 03/26/2010 10:37:02 AM PDT by DannyTN
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Thanks for t he ping.


7 posted on 03/26/2010 11:07:37 AM PDT by GOPJ (http://hisz.rsoe.hu/alertmap/index2.php?area=dam&lang=eng)
[ Post Reply | Private Reply | To 2 | View Replies]

To: CodeToad; Myrddin

ping


8 posted on 03/26/2010 11:15:00 AM PDT by Travis McGee (---www.EnemiesForeignAndDomestic.com---)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Travis McGee

Most of these “exploits” require physical access to the machine or for a user to purposefully install a piece of software. I take them with a grain of salt.


9 posted on 03/26/2010 11:23:03 AM PDT by CodeToad
[ Post Reply | Private Reply | To 8 | View Replies]

To: ShadowAce
Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit

Enjoy your Java.


10 posted on 03/26/2010 11:36:36 AM PDT by PA Engineer (Liberate America from the occupation media.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paladin2
Uh, or not.

Indeed.



11 posted on 03/26/2010 12:01:48 PM PDT by rdb3 (The mouth is the exhaust pipe of the heart.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce
Umm, yeah. They also broke everything else too.

Not exactly a slam against MS, when it's taken in context.

Everyone has flaws, and these guys find them.

12 posted on 03/26/2010 1:37:50 PM PDT by TChris ("Hello", the politician lied.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson