Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Researchers Awarded $552,500 at Pwn2Own 2015

Researchers who took part in the Pwn2Own 2015 hacking competition at the CanSecWest security conference have earned a total of $552,500, plus non-monetary prizes such as laptops and Zero Day Initiative (ZDI) points.

Researchers who took part in the Pwn2Own 2015 hacking competition at the CanSecWest security conference have earned a total of $552,500, plus non-monetary prizes such as laptops and Zero Day Initiative (ZDI) points.

On the first day of the event, participants received a total of $317,500 after presenting three bugs in Adobe Flash, three bugs in Adobe Reader, three bugs in Windows, two bugs in Mozilla Firefox, and two bugs in Internet Explorer. On the second day, researchers got $235,000 for two flaws in Windows, two flaws in Internet Explorer, one flaw in Firefox, two flaws in Apple Safari, and one flaw in Google Chrome.

Day two started with an attack on Firefox. The researcher ilxu1a found an out-of-bounds read/write vulnerability leading to a medium-integrity code execution, for which he received $15,000. At the end of the day, ilxu1a also attempted to hack Chrome, but he ran out of time before he could get the exploit to work.

JungHoon Lee (lokihardt) was the best competitor this year with a total reward of $225,000. He hacked Chrome (both the stable and beta versions), Internet Explorer, and Safari.

The Chrome attack earned him a total of $110,000, which is the single biggest payout in Pwn2Own history, according to HP. The expert broke the web browser by exploiting a buffer overflow race condition in Chrome, and an info leak and a race condition in two Windows kernel drivers for system privileges.

“This is an amazing accomplishment for anyone, but it’s especially impressive considering he is an individual competitor rather than a team. Well done,” Dustin Childs of HP Security Research said in a blog post.

Lee cracked Internet Explorer with a time-of-check to time-of-use (TOCTOU) vulnerability, and Safari with a use-after-free flaw in an uninitialized stack pointer and a sandbox bypass.

All of the 21 vulnerabilities used at Pwn2Own have been disclosed to the affected vendors, which, according to HP, are working on fixing the issues.

Advertisement. Scroll to continue reading.

The total payout at Pwn2Own 2015 was smaller compared to the previous year when HP and the other sponsors awarded participants $850,000 of the total prize pool of $1,085,000.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.