iPhone, IE 8, Firefox succumb to exploits in Pwn2Own

Two researchers participating in a hacking contest on Wednesday brought down the Apple iPhone, a difficult assignment considering the latest version of the popular mobile device contains new security measures designed to combat exploit attempts.

Participating in the Pwn2Own contest as part of the CanSecWest conference in Vancouver, British Columbia, Vincent Iozzo and Ralf-Phillipp Wienmann used a technique known as return-oriented programming to exploit the bug in the iPhone's Safari browser.

The vulnerability allows an attacker to execute remote code if a user is tricked into visiting a malicious website via the Safari browser. The payload, as the two men demonstrated, allowed them to steal messages contained in the phone's SMS database and send it back to a web server under their control.

To launch the exploit, the researchers had to find a way to evade code signing and data execution prevention safeguards present in v2.0 of the iPhone, meant to limit arbitrary code from running on the device.

"It is the first time that this technique has been publicly demonstrated on a real-world telephone," said a news release announcing the feat. "The demonstrated attack code steals the SMS database from the phone, albeit other attack payloads are easily possible."

For their achievement, the researchers won $15,000.

According to reports from the contest, Safari on the MacBook Pro also was successfully exploited at the hands of Charlie Miller of Independent Security Evaluators and one of the best known Apple hackers.

Internet Explorer (IE) 8 and Firefox 3, both running on 64-bit Windows 7 machines, also fell. Google's Chrome browser, apparently thanks to its "sandbox" features, has so far survived another year of competition.

Researcher Peter Vreugdenhil was responsible for the IE hack, while a white-hat hacker known as "Nils," of security testing firm MWR InfoSecurity, accomplished the Firefox exploit.

All of the exploits took the winners just seconds to demonstrate, but months of research to devise.

TippingPoint's Zero Day Initiative, which offers the cash prizes, acquires the rights to the vulnerability discoveries and soon will send details to the affected vendors.

More in News

Privacy-bolstering "Apps Act" introduced in House

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Microsoft readies permanent fix for Internet Explorer bug used in energy attacks

Microsoft is prepping a whopper of a security update that will close 33 vulnerabilities, likely including an Internet Explorer (IE) flaw that has been used in targeted website attacks against the U.S. government.

Weakness in Adobe ColdFusion allowed court hackers access to 160K SSNs

Up to 160,000 Social Security numbers and one million driver's license numbers may have been accessed by intruders.