iPhone, IE 8, Firefox succumb to exploits in Pwn2Own

Share this article:

Two researchers participating in a hacking contest on Wednesday brought down the Apple iPhone, a difficult assignment considering the latest version of the popular mobile device contains new security measures designed to combat exploit attempts.

Participating in the Pwn2Own contest as part of the CanSecWest conference in Vancouver, British Columbia, Vincent Iozzo and Ralf-Phillipp Wienmann used a technique known as return-oriented programming to exploit the bug in the iPhone's Safari browser.

The vulnerability allows an attacker to execute remote code if a user is tricked into visiting a malicious website via the Safari browser. The payload, as the two men demonstrated, allowed them to steal messages contained in the phone's SMS database and send it back to a web server under their control.

To launch the exploit, the researchers had to find a way to evade code signing and data execution prevention safeguards present in v2.0 of the iPhone, meant to limit arbitrary code from running on the device.

"It is the first time that this technique has been publicly demonstrated on a real-world telephone," said a news release announcing the feat. "The demonstrated attack code steals the SMS database from the phone, albeit other attack payloads are easily possible."

For their achievement, the researchers won $15,000.

According to reports from the contest, Safari on the MacBook Pro also was successfully exploited at the hands of Charlie Miller of Independent Security Evaluators and one of the best known Apple hackers.

Internet Explorer (IE) 8 and Firefox 3, both running on 64-bit Windows 7 machines, also fell. Google's Chrome browser, apparently thanks to its "sandbox" features, has so far survived another year of competition.

Researcher Peter Vreugdenhil was responsible for the IE hack, while a white-hat hacker known as "Nils," of security testing firm MWR InfoSecurity, accomplished the Firefox exploit.

All of the exploits took the winners just seconds to demonstrate, but months of research to devise.

TippingPoint's Zero Day Initiative, which offers the cash prizes, acquires the rights to the vulnerability discoveries and soon will send details to the affected vendors.

Share this article:

Sign up to our newsletters

More in News

In Cisco probe, misuse or compromise spotted on all firms' networks

In Cisco probe, misuse or compromise spotted on ...

Cisco analyzed the business networks of 30 multinational companies last year, and revealed the findings in its 2014 Annual Security Report.

Fareit trojan observed spreading Necurs, Zbot and CryptoLocker

The Necurs and Zbot trojans, as well as CryptoLocker ransomware, has been observed by researchers as being spread through another trojan, known as Fareit.

Post Heartbleed, tech giants join initiative to bolster open source

Post Heartbleed, tech giants join initiative to bolster ...

The newly formed Core Infrastructure Initiative, created to boost under-funded open source projects, will tackle OpenSSL first.