Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Chinese hacker cracks Safari, wins $40K, praises Apple's security
CNN Tech Fortune ^ | March 14, 2014: 12:07 PM ET | By Philip Elmer-DeWitt

Posted on 03/15/2014 3:47:15 PM PDT by Swordmaker

Some of his prize money will go to families of the missing Malaysian airline.

Keen Team's Chen, right, demonstrating an Adobe Flash exploit FORTUNE -- Everybody's Web software got "pwned" at the Pwn2Own hackers conference this week: Apple's (AAPL) Safari, Google's (GOOG) Chrome, Microsoft's (MSFT) Internet Explorer, Mozilla's Firefox and Adobe's (ADBE) Reader and Flash.

Chrome was hacked by a French team from Vupen Security with a use-after-free vulnerability that affects both the WebKit and Blink rendering engines.

Safari was defeated by Liang Chen, one of a pair Chinese Keen Team hackers, using a heap-overflow-and-sandbox-bypass combination that took three months to perfect. . .

. . . "I think the Webkit fix will be relatively easy," Chen told Mimoso. "The system-level vulnerability is related to how they designed the application; it may be more difficult for them."

(Excerpt) Read more at tech.fortune.cnn.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: spinningwheelofhell
"For Apple, the OS is regarded as very safe and has a very good security architecture," Chen told ThreatPost's Michael Mimoso. "Even if you have a vulnerability, it's very difficult to exploit. Today we demonstrated that with some advanced technology, the system is still able to be pwned. But in general, the security in OS X is higher than other operating systems."

1 posted on 03/15/2014 3:47:15 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
As usual, Apple fell first at the Pwn2Own Security Hackers Conference last week, because the winner, Liang Chen, spent three months preparing his exploit. However, every other browser and attempt also fell including Firefox, Chrome, Internet Explorer, and even Adobe Reader and Flash. Liang Chen commented ". . . In general, the security in OS X is higher than other operating systems" and "Even if you have a vulnerability, it's very difficult to exploit."—PING!


Apple Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 03/15/2014 3:56:22 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
. . . In general, the security in OS X is higher than other operating systems" and "Even if you have a vulnerability, it's very difficult to exploit."

I'm still allowing Apple to protect me. I NEVER type that password when I see this type of box pop us unexpectedly. Besides, I have nothing of interest to anybody but (possibly) the NSA. They want to know what I say to Aunt Maude...


3 posted on 03/15/2014 4:08:24 PM PDT by WVKayaker ("Today, doesn't it seem like we have a Corrupt Bastards Club in D.C.? On steroids?" -Sarah Palin)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

Amazing. . . I am in error. Safari did not fall first! Internet Explorer fell first this year, garnering $100,000 for the team that exploited it and Windows 8.1!


4 posted on 03/15/2014 4:26:05 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

This article is light on information. It doesn’t say much to get me worried.


5 posted on 03/15/2014 4:29:44 PM PDT by amigatec (The only change you will see in the next four years will be what's in your pocket.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Safari was defeated by Liang Chen

Big deal, so he can hack computers........Can he play infield? Ha, thought so.......

6 posted on 03/15/2014 4:34:26 PM PDT by Hot Tabasco (Was Occam's razor made by Gillette?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I cracked Tic Tac Toe.


7 posted on 03/15/2014 4:36:24 PM PDT by Starstruck (If my reply offends, you probably don't understand sarcasm or criticism...or do.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Thank you for the good news. Is Apple going to hire him to motivate his silence? : )
8 posted on 03/15/2014 4:37:07 PM PDT by Chgogal (Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Chgogal
Thank you for the good news. Is Apple going to hire him to motivate his silence? : )

Apple was at the conference and will close the vulnerability. . .

9 posted on 03/15/2014 5:08:03 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker
I'm sure Apple will close the vulnerability but one shouldn't let a good talent go to waste. : )
10 posted on 03/15/2014 5:49:24 PM PDT by Chgogal (Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Swordmaker

“But in general, the security in OS X is higher than other operating systems.”

And what is OS X based on? Unix! Specifically BSD-based Unix. Hah! Eat it Windows!


11 posted on 03/15/2014 6:02:18 PM PDT by LaRueLaDue
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
But in general, the security in OS X is higher than other operating systems.

The thing that kills me is that people are lax at using security precautions. I helped three different individuals with their computers in the last few weeks. All were using the default administrator ID to log in. A couple had no password at all to log in. And so on. All their data in the desktop window, none in separate folders without sharing privileges etc. Companies put a lot of work into security architecture and people don't put it to use.

12 posted on 03/15/2014 6:40:03 PM PDT by roadcat
[ Post Reply | Private Reply | To 1 | View Replies]

Consider this sponsored hacking exercise a good thing.


13 posted on 03/16/2014 2:07:19 AM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Thanks Swordmaker.


14 posted on 03/17/2014 7:44:17 AM PDT by SunkenCiv (https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson