Vista notebook falls in hacker challenge
Follows MacBook Air in 'Pwn to Own' contest; hacker exploits flaw in Flash to win $5,000
Computerworld - A security researcher on Friday exploited a critical bug in Adobe Systems Inc.'s Flash Player to hack a notebook running Windows Vista Ultimate, the second machine to fall in this year's "Pwn to Own" challenge.
The only unclaimed laptop of the original trio by the contest's end was a Sony Vaio running the Ubuntu distribution of Linux.
Shane Macaulay, a consultant at Security Objectives, claimed the $5,000 cash prize by breaking into a Fujitsu U810 running Windows Vista Ultimate SP1 late Friday. According to 3Com Inc.'s TippingPoint unit, which put up the prizes for the three-day hacker challenge at the CanSecWest conference, Macaulay exploited an unidentified zero-day vulnerability of the ubiquitous Flash Player.
Macaulay, who was assisted by Derek Callaway, also of Security Objectives, and Alexander Sotirov, an independent researcher, was the second Pwn to Own winner. On Thursday, Independent Security Evaluators LLC analyst Charlie Miller hacked a MacBook Air using a vulnerability in Apple Inc.'s Safari browser to win the notebook and a $10,000 check from TippingPoint.
Austin, Texas-based TippingPoint, perhaps best known for its Zero Day Initiative (ZDI) bug bounty program, announced Macaulay's win in a post to its blog.
Like Miller, Macaulay was bound by a nondisclosure agreement with the security firm, which under the Pwn to Own rules acquired the vulnerability its ZDI. TippingPoint said it has reported the bug to Adobe. "Until Adobe releases a patch for this issue, neither we nor the contestants will be giving out any additional information about the vulnerability," the company said in the blog post.
The hacking challenge, which kicked off last Wednesday, expanded the notebooks' exposure to attack after the first and second days. No one, however, walked away with the first day's $20,000 prize, which had required that researchers break into one of the laptops using a remote code-execution exploit that didn't rely on any user interaction. Miller won his $10,000 and the MacBook Air after attacks were allowed on applications installed by default and in which user actions could be replicated.
On Friday, when Macaulay took down Windows Vista, contest organizers added a number of popular third-party client applications to the remaining two notebooks, including Adobe's Acrobat Reader and Flash Player, the Firefox browser, and voice-over-IP program Skype.
Adobe patched Flash Player several times last year. The most recent large-scale security update was issued last December to plug nine holes in the software.
Macaulay also had a part in 2007's inaugural Pwn to Own contest, which pitted a single computer, a MacBook Pro, against all comers for a $10,000 prize. Although Dino Dai Zovi provided the QuickTime exploit that hacked the machine last year, Macaulay served as his on-site partner.
Read more about Security in Computerworld's Security Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts