Новости компьютерной безопасности:

  Latest News

29 0-days Uncovered : Hackers Earned $1,132,500 Pwn2Own Vancouver 2024

С сайта: Vulnerability(cybersecuritynews.com)

29 0-days Uncovered : Hackers Earned $1,132,500 Pwn2Own Vancouver 2024

Author: Guru Baran

The Pwn2Own Vancouver 2024 has come to an end, with researchers receiving a total of $1,132,500 for uncovering 29 distinct zero-day vulnerabilities. 

Manfred Paul has been granted the title of Pwn Master. In all, he earned $202,500 and 25 points.

On the first day, a new Tesla Model 3 was given to the Synacktiv (@synacktiv) team.

That's a wrap! #Pwn2Own Vancouver is complete. Overall, we awarded $1,132,500 for 29 unique 0-days. Congrats to @_manfp for winning Master of Pwn with $202,500 and 25 points. Here's the final top 10 list: pic.twitter.com/4ZFKWBQffI
— Zero Day Initiative (@thezdi) March 22, 2024
Highlights Of Day 2
Marcin Wiązowski elevated privileges on Windows 11 using an improper input validation flaw. He received $15,000 along with three Master of Pwn points.

Two bugs were used in STAR Labs SG’s VMware Workstation hack. The other variable was known beforehand, while the first is uninitialized.

They still receive $30,000 and six Master of Pwn points.

Confirmed! STAR Labs SG's exploit of #VMware Workstation used two bugs. One is an uninitialized variable, but the other was previously know. They still win $30,000 and 6 Master of Pwn points. pic.twitter.com/kGk5MecSGp
— Zero Day Initiative (@thezdi) March 21, 2024
To exploit Oracle VirtualBox, ColdEye used two vulnerabilities, one of which was a UAF.

Even the guest OS remained undamaged. He gains four Master of Pwn points and $20,000 for his guest-to-host escape.

Manfred Paul (@_manfp) accomplished his Mozilla Firefox sandbox escape by using an OOB Write for the RCE and an exposed dangerous function bug.

He gains an additional $100,000 in addition to 10 Master of Pwn points, putting him ahead of the lead with 25.

CONFIRMED! Manfred Paul (@_manfp) used an OOB Write for the RCE and an exposed dangerous function bug to achieve his sandbox escape of #Mozilla #Firefox. He earns another $100,000 and 10 Master of Pwn points, which puts him in the lead with 25. #Pwn2Own pic.twitter.com/kxDwBf17oj
— Zero Day Initiative (@thezdi) March 21, 2024
Gabriel Kirkpatrick (gabe_k of exploits.forsale), a first-time Pwn2Own competitor, escalated privileges on #Windows 11 by utilizing an inherently difficult race condition.

Along with three Master of Pwn points, he receives $15,000.

Palo Alto Networks’ Edouard Bochin (@le_douds) and Tao Yan (@Ga1ois) leveraged an OOB Read in conjunction with a unique method to get beyond V8 hardening and obtain arbitrary code execution in the renderer.

They proceeded to use the same weaknesses to exploit Chrome and Edge, collecting $42,500 and nine Master of Pwn points.

KAIST Hacking Lab’s Seunghyun Lee (@0x10n) utilized a UAF to RCE in the renderer on both Microsoft Edge and Google Chrome.

He receives $9 Master of Pwn points and $85,000. His contest total now stands at $145,000 plus 15 Master of Pwn points.

Confirmed!! Seunghyun Lee (@0x10n) of KAIST Hacking Lab used a UAF to RCE in the renderer on both #Micosoft Edge and #Google Chrome. He earns $85,000 and 9 Master of Pwn points. That also puts us over $1,000,000 for the event! #Pwn2Own pic.twitter.com/7J5cHnMJgQ
— Zero Day Initiative (@thezdi) March 21, 2024
Using an Improper Update of Reference Count flaw, Valentina Palmiotti (@chompie1337) of IBM X-Force was able to escalate privileges on Windows 11.

She won three Master of Pwn points and $15,000 after nailing her first #Pwn2Own competition.

On the Pwn2Own first day, the hackers particularly hacked Oracle VM, Adobe Reader, Microsoft Sharepoint, Tesla ECU, and Ubuntu.

Especially, combining a heap-based buffer overflow, a UAF, and an uninitialized variable flaw, Gwangun Jung (@pr0ln) and Junoh Lee (@bbbig12) from Theori (@theori_io) were able to escape VMware Workstation and run code as SYSTEM on the host Windows OS.

They receive $130,000 and 13 Master of Pwn points for their outstanding achievement.

The Synacktiv (@synacktiv) team exploited the Tesla ECU with Vehicle (VEH) CAN BUS Control by using a single integer overflow.

The winners receive a new Tesla Model 3 (their second!), $200,000, and 20 Master of Pwn points.

Based on the last three Pwn2Own events (Vancouver, Automotive, and Toronto), ZDI has given out $3,494,750 at Pwn2Own events this year. 

Additionally, you can find a comprehensive overview of the Pwn2Own Vancouver2024 Day 2 results here.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us onLinkedIn&Twitter.



#Bug_Bounty #Cyber_Security_News #Vulnerability #Cybersecurity_Research #Pwn2Own_Vancouver_2024 #Zero-Day_Vulnerabilities

Оригинальная версия на сайте: 29 0-days Uncovered : Hackers Earned $1,132,500 Pwn2Own Vancouver 2024
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.