Researcher chains three exploits to take down IE8 at Pwn2Own
Marks the first ever Pwn2Own escape from a browser sandbox
Computerworld - An Irish security researcher today said it took him six weeks to craft a three-exploit package that brought Microsoft's Internet Explorer 8 (IE8) to its knees at Pwn2Own Wednesday.
Independent researcher Stephen Fewer walked off with $15,000 and a Sony notebook yesterday after hacking IE8 on Windows 7 by exploiting three unpatched vulnerabilities in the operating system and browser.
"It was a challenge, especially engineering the exploit that escaped Protected Mode," said Fewer today, referring to the "sandbox" that isolates IE8 from the rest of the computer.
The sandbox, like the one baked into Google's Chrome, is designed to hold malicious code within the browser so that it can't leak into the operating system or system as a whole.
"I spent about six weeks finding the vulnerabilities and engineering the exploits," Fewer said. "Then I decided to give [Pwn2Own] a go, and bought a plane ticket."
Fewer is a first-time Pwn2Own contestant and winner. He has a one-man consulting firm called Harmony Security, and is a long-time contributor to both the Metasploit open-source penetration testing toolkit project, and to HP TippingPoint's Zero Day Initiative (ZDI) bug bounty program, which pays researchers for finding and reporting vulnerabilities. TippingPoint is the sponsor of Pwn2Own.
Fewer chained three exploits together to bring down IE8, a feat that Aaron Portnoy, manager of TippingPoint's security research team and Pwn2Own's organizer, called "impressive" yesterday.
Two of the three were necessary to craft a reliable attack that sidestepped ASLR, for "address space layout randomization," and DEP, or "data execution prevention," on Windows 7. ASLR and DEP are technologies baked into Microsoft's operating system designed to make it more difficult for exploits to reliably execute.
The third exploit leveraged yet another bug to jump out of the Protected Mode sandbox.
"That was pretty difficult," said Fewer, talking about the sandbox-escape exploit. "It took quite a while to engineer that, and then there was the time pressure of the contest."
By escaping Protected Mode, Fewer was able to gain complete control over the Sony laptop running Windows 7, a point he proved by adding a file to the machine, mimicking a cybercriminal's insertion of additional malware.
Fewer's hack of IE was the first ever at Pwn2Own to bust out of a browser sandbox. Although Chrome also boasts an anti-exploit sandbox, that browser has never been breached at Pwn2Own.
Yesterday, one expected Chrome contestant was a no-show, while a team slated to go second decided to focus instead on an attack against RIM's BlackBerry OS later today.
Although Fewer acknowledged he hasn't poked around Chrome, he didn't seem surprised that no one took on Google's browser yesterday. "Chrome's sandbox is fundamentally quite solid," he said.
Fewer made use of the work by Peter Vreugdenhil, last year's IE Pwn2Own winner, to build his multi-part package. "Peter's work was great, and I applied a few of his techniques," said Fewer.
Vreugdenhil, who now works for TippingPoint, chained two exploits last year to bypass Windows 7's ASLR and DEP.
The only other browser to fall Wednesday was Apple's Safari 5, which dropped to a team from French security company Vupen minutes before Fewer took his shot at IE8.
Not surprisingly, Fewer felt great about winning the $15,000. "I feel fantastic," he said today. "Everything here went very smoothly."
He plans to spend the cash prize to pay for his trip from the U.K. and on some home improvements.
Today's Pwn2Own schedule will pit researchers against Mozilla's Firefox -- that browser's turn was postponed to today after Wednesday's round started late -- and four smartphones running Apple's iOS, Google's Android, Microsoft's Windows Phone 7 and RIM's BlackBerry OS.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- iPhone, BlackBerry tumble to Pwn2Own hackers
- Researcher chains three exploits to take down IE8 at Pwn2Own
- Safari, IE hacked first at Pwn2Own
- Researcher blows $15K by reporting bug to Google
- Microsoft won't patch IE before Pwn2Own
- Apple to patch Safari before Pwn2Own, say researchers
- Mozilla follows Google, patches Firefox as prep for Pwn2Own
- Three-time Pwn2Own winner knocks hacking contest rules
- Familiar faces, new names step up at Pwn2Own hacking contest
- Update: Firefox update will patch CSRF bug, Mozilla says
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Cybercrime and Hacking White Papers | Webcasts