Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Researchers Uncover macOS and Safari Exploits at Pwn2Own 2018
MacRumors ^ | March 15, 2018 | MacRumors

Posted on 03/17/2018 12:14:12 PM PDT by Swordmaker

The eighteenth annual CanSecWest security conference is underway in downtown Vancouver, Canada, where researchers are competing in the 11th Pwn2Own computer hacking contest for over $2 million in prizes.

Day one results have already been published over at the Zero Day Initiative website, with a couple of successful Mac-related exploits already appearing in the list of achievements.


Image via Zero Day Initiative​

Samuel Groß of phoenhex returned to Pwn2Own to successfully hack Apple's desktop Safari browser. Groß used a JIT optimization bug in Safari, a macOS logic bug, and a kernel overwrite to execute code to successfully exploit the browser, earning himself $65,000 and six points towards Master of Pwn. The exploit also caused a text-based message to appear on a MacBook Pro's Touch Bar.

The achievement harks back to Groß's similar success at last year's event, where he targeted Safari with an escalation to root on macOS that allowed him and Niklas Baumstark to scroll a message on a MacBook Pro Touch Bar, earning them $28,000.

Another Safari exploit at Pwn2Own 2018 was initiated by Richard Zhu, who managed to bypass iPhone 7 security protocols with the help of two Safari bugs at November's Pwn2Own mobile event. However, this time Zhu failed to get his exploit chain working within the allotted 30-minute time limit.


Richard Zhu at Pwn2Own 2018 (Image via ZDI)​

Unfazed, Zhu returned to wow the crowd with a Microsoft Edge exploit that used two use-after-free (UAF) bugs in the browser and an integer overflow in the kernel to successfully run his code with elevated privileges. The dramatic effort against the ticking clock earned him $70,000 and seven points towards Master of Pwn.

Apple representatives have attended the Pwn2Own contest in the past, and affected parties are made aware of all security vulnerabilities discovered during the contest so that they can be patched in future software updates.

The participating teams earned a total of $162,000 in prizes on day one, and the event resulted in three Apple bugs, two Oracle bugs, and three Microsoft bugs. Pwn2Own day two begins today at 10:00 a.m. Pacific and will involve additional exploit attempts against macOS and Safari.

Update: On Pwn2Own Day 2, MWR Labs, a team consisting of Alex Plaskett, Georgi Geshev, and Fabi Beterke successfully used two Safari vulnerabilities to execute a sandbox escape. For the feat, they earned $55,000 and 5 Master of Pwn points.

In a separate attempt, Markus Gaasedelen, Nick Burnett, Patrick Biernat of Ret2 Systems, Inc. tried to target Safari using an elevation of privileges kernel exploit, but the team was unable to get the exploit working in the allotted time period.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applepinglist; mac; macos; pwn2own; safari

1 posted on 03/17/2018 12:14:12 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: dayglored; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; ...
Pwn20wn pays a lot better these days, and several Safari/MacOS exploits were found and handed to Apple for fixing in this year's CanSecWest WhiteHat contest. —PING!


Apple MacOS Security Holes Found in Pwn20wn Contest Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 03/17/2018 12:18:33 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I’m in awe of these guys finding these previously unknown exploits. How in the world do they do it? I think it would be like looking for a single needle in 10,000 haystacks.


3 posted on 03/17/2018 2:17:18 PM PDT by ProtectOurFreedom
[ Post Reply | Private Reply | To 2 | View Replies]

To: ProtectOurFreedom

Operating system internals expert


4 posted on 03/17/2018 2:33:41 PM PDT by kdot
[ Post Reply | Private Reply | To 3 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson