Skip to main content

Pwn2Own: Safari, iPhone, IE, and Firefox All Fall

Image used with permission by copyright holder

The Pwn2Own contest at the annual CanSecWest conference in Vancouver, British Columbia has become something of a media event for security researchers, a chance for them to step out from behind glowing LCDs and demonstrate that some of the security threats they’ve hinted could impact everyday computer users are real—and pick up some cash money for their efforts. And this year, they did not disappoint: at the Pwn2Own contest, Apple’s iPhone and Safari fell first to security experts, followed in short order by Internet Explorer 8 and Firefox on Windows 7.

On the Macintosh, the star of Pwn2Own this year was again Charlie Miller of Independent Security Evaluators, who picked up the $10,000 top prize by demonstrating a takeover attack on Safari an Apple MacBook Pro that granted complete access to the machine without requiring any physical access—all the Safari user had to do was visit a Web site with malicious code. Miller won $10,000 n 2008 for breaking into a MacBook Air, and $5,000 last year by exploiting another security loophole in Apple’s Safari browser.

Recommended Videos

Dutch security researcher Peter Vreugdenhil also won $10,000 for a security exploit that bypassed security features in Microsoft’s Internet Explorer 8. A researcher from the UK’s MWR InfoSecurity named Nils—no last names, please—picked up another $10,000 for an exploit targeting Firefox on the the 64-bit version of Windows 7. Last year, Nils picked up $15,000 for a collection of exploits that targeted Firefox, Safari, and Internet Explorer 8.

Perhaops the star of the show, however, was Apple’s iPhone, which fell victim to Ralf Philipp Weinmann and Vincenzo Iozzo, of the University of Luxembourg and the German company Zynamics (respectively), who will share a $15,000 prize.

Researchers aren’t sharing the specifics of their attacks with the general public, in order to give browser and operating system developers a change to patch the loopholes. However, Miller’s attack on Safari is being described as so reliable that, in information security terms, it’s “weaponized.” Vreugdenhil’s attack on IE8 was a four-part process that exploited two separate vulnerabilities; as with Miller’s Safari attack, it launched from a user connecting to a Web site containing malicious code. Nils’ attack on Firefox exploited a memory corruption bug.

Weinmann and Iozzo’s attack on the iPhone also involved visiting a site bearing malicious code; the technique bypassed the iPhone’s code-signing requirement and could be used to access an iPhone’s SMS database, contacts, photos, or other data.

The Pwn2Own contest is sponsored by TippingPoint’s Zero Day Initiative.

As of the start of the second day of the Pwn2Own contest, Google’s Chrome 4 remains the only browser left standing…but that’s probably because it wasn’t tested at all on the first day.

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
iPhone error 4013: What it is and how to fix it
iPhone 14 Pro Max in hand.

While we're long past the days where a wired USB to Lightning connection was necessary to install iPhone software updates, sometimes it's still an easier way to go — for example, if you have a limited data connection and no Wi-Fi available. And if you run into the dreaded "iPhone Unavailable" error, you may not have any other option but to plug your iPhone in and restore it to factory settings the old-fashioned way.

While this process runs smoothly most of the time, there are scenarios where you may run into a snag. Unfortunately, when this does happen, the error messages can be somewhat inscrutable, offering little help other than to tell you that "An unknown error occurred" and showing a numeric code that gives you little insight into what that "unknown" problem could be. Chief among these is error 4013.

Read more
How to transfer your SIM from an Android phone to an iPhone 15
Transferring an eSIM from an old iPhone to an iPhone 14.

Apple made a big change with the iPhone 14, moving to an eSIM-only configuration that makes it impossible to use your current phone's SIM card. That continues with the iPhone 15, with no physical SIM card slot available on the new lineup. However, all is not lost, as there are a few simple ways to transfer your SIM from an Android phone to an iPhone 15.

The easiest way to get your SIM from Android to iPhone 15 is by going through one of the major carriers, such as AT&T and Verizon. This works in a few different ways, but rest assured that your Android SIM can be brought over to the wonderful world of iPhone eSIM.

Read more
How to sync your iPhone with your iPad for seamless use
iPhone 11 Pro and iPad 2020

Long gone are the days when you had to pull out a USB to Lightning cable to load up your favorite music, photos, or even your calendar from your Mac or PC onto your iPhone or iPad. Now, you can keep everything in the cloud, and it will seamlessly sync between all your devices whenever you have a Wi-Fi or cellular data connection.

Read more