Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Researchers Awarded $552,500 at Pwn2Own 2015

Researchers who took part in the Pwn2Own 2015 hacking competition at the CanSecWest security conference have earned a total of $552,500, plus non-monetary prizes such as laptops and Zero Day Initiative (ZDI) points.

Researchers who took part in the Pwn2Own 2015 hacking competition at the CanSecWest security conference have earned a total of $552,500, plus non-monetary prizes such as laptops and Zero Day Initiative (ZDI) points.

On the first day of the event, participants received a total of $317,500 after presenting three bugs in Adobe Flash, three bugs in Adobe Reader, three bugs in Windows, two bugs in Mozilla Firefox, and two bugs in Internet Explorer. On the second day, researchers got $235,000 for two flaws in Windows, two flaws in Internet Explorer, one flaw in Firefox, two flaws in Apple Safari, and one flaw in Google Chrome.

Day two started with an attack on Firefox. The researcher ilxu1a found an out-of-bounds read/write vulnerability leading to a medium-integrity code execution, for which he received $15,000. At the end of the day, ilxu1a also attempted to hack Chrome, but he ran out of time before he could get the exploit to work.

JungHoon Lee (lokihardt) was the best competitor this year with a total reward of $225,000. He hacked Chrome (both the stable and beta versions), Internet Explorer, and Safari.

The Chrome attack earned him a total of $110,000, which is the single biggest payout in Pwn2Own history, according to HP. The expert broke the web browser by exploiting a buffer overflow race condition in Chrome, and an info leak and a race condition in two Windows kernel drivers for system privileges.

“This is an amazing accomplishment for anyone, but it’s especially impressive considering he is an individual competitor rather than a team. Well done,” Dustin Childs of HP Security Research said in a blog post.

Lee cracked Internet Explorer with a time-of-check to time-of-use (TOCTOU) vulnerability, and Safari with a use-after-free flaw in an uninitialized stack pointer and a sandbox bypass.

All of the 21 vulnerabilities used at Pwn2Own have been disclosed to the affected vendors, which, according to HP, are working on fixing the issues.

The total payout at Pwn2Own 2015 was smaller compared to the previous year when HP and the other sponsors awarded participants $850,000 of the total prize pool of $1,085,000.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Vulnerabilities

Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.