04.08.2016 Views

$hell on Earth

shell-on-earth

shell-on-earth

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

History and Anatomy of<br />

Remote Browser to Super-<br />

User Exploits at Pwn2Own<br />

With the advent of sandboxes in most major browsers, c<strong>on</strong>testants were forced to take additi<strong>on</strong>al steps<br />

to win the top prize at Pwn2Own. In the beginning, many of the vulnerabilities in the browser sandbox<br />

were logic flaws that allowed c<strong>on</strong>testants easy access to elevated executi<strong>on</strong>. Over the years, the vendors<br />

strengthened the sandbox attack surface, leaving the c<strong>on</strong>testants with no opti<strong>on</strong> but to go directly to the<br />

kernel to escalate privileges.<br />

This evoluti<strong>on</strong> can be witnessed by the types and numbers of successful exploits attempted at the c<strong>on</strong>test.<br />

For example, <strong>on</strong>ly <strong>on</strong>e of the entries in the 2013 c<strong>on</strong>test gained SYSTEM-level code executi<strong>on</strong> against<br />

the target laptop. In c<strong>on</strong>trast, four c<strong>on</strong>testants of the Pwn2Own 2015 c<strong>on</strong>test achieved this same goal.<br />

Here is a list of the successful entries:<br />

Pwn2Own 2013<br />

J<strong>on</strong> Butler and Nils targeting Google Chrome<br />

• Type C<strong>on</strong>fusi<strong>on</strong> Vulnerability in the Renderer Process<br />

• Privilege Escalati<strong>on</strong> via NtUserMessageCall win32k Kernel Pool Overflow Vulnerability<br />

Pwn2Own 2014<br />

Sebastian Apelt and Andreas Schmidt targeting Microsoft Internet Explorer<br />

• Use-After-Free Vulnerability in the Renderer Process<br />

• Privilege Escalati<strong>on</strong> via AFD.sys Dangling Pointer Vulnerability<br />

6 | <str<strong>on</strong>g>$hell</str<strong>on</strong>g> <strong>on</strong> <strong>Earth</strong>: From Browser to System Compromise

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!