- Solutions
- Services
- Products
- Integrated Systems
- Software
- Application Lifecycle Management
- Big Data Analytics
- DevOps
- Enterprise Security
- Hybrid and Private Cloud
- Information Governance Software
- Information Management Software
- IT Service Management Software
- Operations Management
- Server Management
- Software as a Service (SaaS)
- Software-Defined Data Center
- Storage Management
- All Software
- Servers
- Storage
- Networking
- About Us
- Support
-
- Solutions
- Services
- Products
- Integrated Systems
- Software
- Application Lifecycle Management
- Big Data Analytics
- DevOps
- Enterprise Security
- Hybrid and Private Cloud
- Information Governance Software
- Information Management Software
- IT Service Management Software
- Operations Management
- Server Management
- Software as a Service (SaaS)
- Software-Defined Data Center
- Storage Management
- All Software
- Servers
- Storage
- Networking
- About Us
- Support
- Community Home
- >
- Software
- >
- Security Research
- >
- Pwn2Own 2015: Day Two results
-
-
Categories
- Solutions
- IT Transformation
- Topics
- Big Data
- Cloud
- Security
- Infrastructure
- Products
- Cloud
- Integrated Systems
- Networking
- Servers and Operating Systems
- Software
- Services
- Storage
- Company
- Events
- Hewlett Packard Labs
- Partner Certification
- Partner Solutions
- Welcome
- Welcome
- Announcement
- Tips & Tricks
- Feedback
-
Blogs
- All About the Apps
- Alliances
- Around the Storage Block
- Behind the scenes @ Labs
- Big Data
- BriefingsDirect by Dana Gardner
- Business Service Management
- Cloud Source
- Coffee Coaching
- Converged Data Center Infrastructure
- Discover Insider
- Enterprise Services
- Grounded in the Cloud
- HPE Business Insights
- Infrastructure Insights
- IT Service Management
- LoadRunner and Performance Center
- My Learning Certification
- Networking
- OEM Solutions
- Security Products
- Security Research
- Servers: The Right Compute
- Software Developers
- Software Solutions
- Storage Insiders
- Technical Support Services
- Telecom IQ
- Transforming IT
-
Community Knowledge Base
- Application Performance Management
- Application Security Center
- Data Protection
- Functional Testing/QTP Support Forum
- General Software Products
- HPE Anywhere Developer Platform
- HPE Insight Cluster Management Utility (CMU)
- HP Service Manager
- HP-UX
- IT Asset Manager/DDMI
- Data Center Automation Center
- Linux
- LoadRunner / Performance Center
- Microsoft
- Networking
- Network Management Solutions
- OpenVMS
- Operations Orchestration
- Project Portfolio Management
- ProLiant Servers / NetServers
- Quality Center / ALM
- Records Management/HP Records Manager & HP TRIM
- SDN
- Server Automation
- Servers
- Service Test
- Storage
- Systems Management
- Tru64 UNIX
- UCMDB and UD
- Virtualization Knowledge Base
- VMware
-
Quick Links
- Community FAQ
- FAQ - New features
- FAQ - Getting Started
- FAQ - My Settings
- FAQ - Community Basics
- FAQ - Searching
- FAQ - Posting Messages
- FAQ - Twitter
- FAQ - Bookmarks, Subscriptions, and RSS
- FAQ - Knowledge Base
- FAQ - Blogs
- FAQ - Ideas
- FAQ - Images
- FAQ - Accepted Solutions
- FAQ - Kudos
- FAQ - Me Too
- FAQ - Tagging
- FAQ - Private Messenger
- Community Guidelines
- Contact Us
- Getting Started
- Rules of Participation
- Tell us what you think
- HPE Dev Community
- Live Network
- Software Support Online
- HPE Support Center
-
Categories
-
Categories
-
Blogs
- All About the Apps
- Alliances
- Around the Storage Block
- Behind the scenes @ Labs
- Big Data
- BriefingsDirect by Dana Gardner
- Business Service Management
- Cloud Source
- Coffee Coaching
- Converged Data Center Infrastructure
- Discover Insider
- Enterprise Services
- Grounded in the Cloud
- HPE Business Insights
- Infrastructure Insights
-
Community Knowledge Base
- Application Performance Management
- Application Security Center
- Data Protection
- Functional Testing/QTP Support Forum
- General Software Products
- HPE Anywhere Developer Platform
- HPE Insight Cluster Management Utility (CMU)
- HP Service Manager
- HP-UX
- IT Asset Manager/DDMI
- Data Center Automation Center
- Linux
- LoadRunner / Performance Center
- Microsoft
- Networking
- Network Management Solutions
-
Quick Links
- Community FAQ
- FAQ - New features
- FAQ - Getting Started
- FAQ - My Settings
- FAQ - Community Basics
- FAQ - Searching
- FAQ - Posting Messages
- FAQ - Twitter
- FAQ - Bookmarks, Subscriptions, and RSS
English
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
The second and final day of Pwn2Own 2015 saw successful exploits by both entrants against four products, with each going after multiple targets and collecting a total of $240,000. This brings the two-day payout total to $557,500, not including the value of the laptops, ZDI points, and other prizes given to winning researchers.
Here’s the highlights of the day’s proceedings.
ilxu1a started off Day Two by taking down Mozilla Firefox with an out-of-bounds read/write vulnerability leading to medium-integrity code execution. It happened so quickly that those of us who blinked missed it — although in our defense, it was sub-second execution. He reports he found the bug through static analysis, which is truly impressive. ilxu1a received $15,000 USD for the bug.
For the first of his three targets, JungHoon Lee (lokihardt) took out 64-bit Internet Explorer 11 with a time-of-check to time-of-use (TOCTOU) vulnerability allowing for read/write privileges. He evaded all the defensive mechanisms by using a sandbox escape through privileged JavaScript injection, all of which resulted in medium-integrity code execution. This got his day started out right with a payout of $65,000 USD.
Next, JungHoon Lee (lokihardt) demonstrated an exploit that affects both the stable and beta versions of Google Chrome. He leveraged a buffer overflow race condition in Chrome, then used an info leak and race condition in two Windows kernel drivers to get SYSTEM access. With all of this, lokihardt managed to get the single biggest payout of the competition, not to mention the single biggest payout in Pwn2Own history: $75,000 USD for the Chrome bug, an extra $25,000 for the privilege escalation to SYSTEM, and another $10,000 from Google for hitting the beta version for a grand total of $110,000. To put it another way, lokihardt earned roughly $916 a second for his two-minute demonstration. There are times when “Wow” just isn’t enough.
For his final act of the competition, JungHoon Lee (lokihardt) took out Apple Safari using a use-after-free (UAF) vulnerability in an uninitialized stack pointer in the browser and bypassed the sandbox for code execution. That netted him another $50,000 USD and brought his daily total to $225,000. This is an amazing accomplishment for anyone, but it’s especially impressive considering he is an individual competitor rather than a team. Well done.
The final entrant in Pwn2Own 2015, ilxu1a, attempted to exploit Google Chrome, but ran out of time before he could get his code working. He told us he was having issues with his info leak. While not a winner on this round, he has won twice before and showed some lovely research on the topic. I’m sure we’ll see him again.
As with every Pwn2Own, all vulnerabilities were disclosed to their respective vendors in our “Chamber of Disclosures,” and each vendor is working to fix these bugs through their own processes.
The final numbers for Pwn2Own 2015 are quite impressive:
- 5 bugs in the Windows operating system
- 4 bugs in Internet Explorer 11
- 3 bugs in Mozilla Firefox
- 3 bugs in Adobe Reader
- 3 bugs in Adobe Flash
- 2 bugs in Apple Safari
- 1 bug in Google Chrome
- $557,500 USD bounty paid out to researchers
Again, congratulations to all of this year’s champions. It was a great time for us, and we saw some amazing research throughout the contest. Thanks again to our co-sponsors at Google Project Zero.
See you next year!
Dustin_Childs
I am a senior security content developer with Hewlett-Packard Security Research (HPSR). In this role, I write and edit security analysis and supporting content from researchers, including those from HP’s Zero Day Initiative (ZDI) program. The ZDI program augments HP’s Enterprise Security Products with zero-day research through a network of over 3,000 independent researchers around the world. I am also responsible for providing insight into the threat landscape; competitive intelligence to the research team; and providing guidance on the social media roadmap. Part of my role includes speaking publicly and promoting the research and technology of the HPSR.
- Back to Blog
- Newer Article
- Older Article
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
- SBradley on: HP Security Briefing, Episode 22: The hidden dange...
-
SasiSiddharth
on:
Analyzing CVE-2015-1
635 from cause to cure - Percy Rotteveel on: Crypto Manifesto 2015
-
Ivan Sh
on:
Full details on CVE-2015-0
096 and the failed MS10-... -
Sandeep Sagar
on:
HPSR, Microsoft, disclosure
, and the $125,000 bug ... - Giorgio di Grazia on: POS malware - a look at Dexter and Decebal
-
Nicholas_Fagan
on:
Technical analysis of the SandWorm Vulnerabil
ity (... - Ajayi Oluwaseun Emmanuel on: Hacking my smart TV - an old new thing
-
Ethan MOORE
on:
Mail server-rel
ated injections : Whose problem? -
alvaro_munoz
on:
Update your Struts 1 ClassLoade
r manipulati on filt...
-
0day
(4) -
abap
(1) -
access control
(1) -
adobe
(1) -
Altcoin
(2) -
Android
(1) -
antivirus
(1) -
apache struts
(2) -
Apple
(1) -
Application security
(1) -
appsec
(1) -
April Fools
(2) -
ArcSight Application View
(1) -
ASLR
(1) -
Autonomy
(1) -
Big Data
(1) -
Bitcoin
(4) -
Bitcoin ATM
(1) -
Bitcoin Mining
(1) -
bitcoinATM
(1) -
bounty
(3) -
CanSecWest
(2) -
chrome
(1) -
computer security
(4) -
conferences
(1) -
crashes
(1) -
credit card
(1) -
Cryptocurrency
(4) -
cryptography
(2) -
CVE-2015-1635
(1) -
cyber risk report
(1) -
cybercrime
(2) -
database
(1) -
debugging
(1) -
Denial of Service
(1) -
DEP
(1) -
Disclosure policy
(1) -
django
(1) -
drones
(1) -
DVLabs
(5) -
dynamic analysis
(1) -
Dynamic Application Security Testing
(1) -
Dynamic Web Application Security Testing
(2) -
emet
(1) -
Engineering
(1) -
Enterprise security
(1) -
exploit
(10) -
exploits
(1) -
Field
(1) -
Firefox
(1) -
firmware
(1) -
Fortify
(3) -
Fortify Runtime
(1) -
Fortify SCA
(1) -
FREAK
(1) -
galaxy
(1) -
Google
(1) -
heartbleed
(1) -
HP
(14) -
HP Application Defender
(5) -
HP Atalla
(1) -
HP Fortify
(4) -
HP Fortify SCA
(2) -
HP SecureBase
(2) -
HP Security Research
(2) -
HP Voltage
(1) -
HP WebInspect
(7) -
HPE Security Research
(6) -
HPSR
(114) -
HTTP.sys
(1) -
ibatis
(1) -
IE
(2) -
IE0day
(1) -
IIS
(1) -
Infographic
(1) -
Integer Overflow
(1) -
Internet Explorer
(1) -
Internet of Things
(1) -
Intrusion prevention system IPS
(1) -
iOS
(2) -
IoT
(1) -
Languages
(1) -
lists
(1) -
localhost
(1) -
Malware
(5) -
MemoryProtection
(1) -
Microsoft
(1) -
Microsoft Windows
(1) -
mitigation bypass
(2) -
Mobile
(11) -
monthly patch review
(2) -
MS15-034
(1) -
mybatis
(1) -
Network security
(1) -
next-generation firewall NGFW
(1) -
Nexus
(1) -
NGFW
(1) -
north korea
(1) -
NSA
(1) -
o-day
(1) -
open source
(1) -
openssl
(1) -
OpSec
(2) -
Oracle
(1) -
orm
(1) -
OSINT
(3) -
OWASP AppSec USA
(1) -
patches
(3) -
POODLE
(1) -
Privacy
(3) -
pwn2own
(23) -
pwn4fun
(1) -
python
(3) -
Remote code Exection
(1) -
Research
(7) -
Reserach
(1) -
reverse engineering
(1) -
RFD
(1) -
risk report
(1) -
RSA
(1) -
ruby
(1) -
rulepack
(1) -
Safari
(2) -
Samsung
(3) -
sandboxbypass
(1) -
SAP
(1) -
SCA
(1) -
SecOps
(2) -
security
(37) -
security conference
(1) -
security intelligence
(2) -
Security Research
(12) -
security tools
(1) -
seven pernicious kingdoms
(2) -
SIEM
(2) -
SOC
(2) -
software security
(2) -
Software Security Research
(1) -
sony
(1) -
sourceanalyzer
(1) -
speaking
(1) -
Spring
(1) -
SQL Injection
(1) -
SSC
(1) -
SSR
(10) -
static analysis
(3) -
static analyzer
(1) -
Struts1
(1) -
Struts2
(1) -
stuxnet
(3) -
threat briefing
(2) -
threat briefings
(1) -
Threat intelligence
(3) -
threat modeling
(2) -
threatbriefings
(21) -
threatmodeling
(2) -
TippingPoint
(4) -
tools
(1) -
trojan
(1) -
UAF
(1) -
unicorn
(1) -
Vertica
(1) -
Virus Bulletin
(1) -
vulnerabilities
(7) -
Vulnerability
(7) -
vulnerability analysis
(1) -
vulnerability research
(1) -
Web Framework Vulnerabilities
(1) -
WebInspect
(2) -
Windows Server 2003
(1) -
ZDI
(37) -
ZDI@10
(2) -
Zero Day
(1) -
Zero Day Initiative
(14)
Hewlett Packard Enterprise International
© Copyright 2015 Hewlett Packard Enterprise Development LP

