Pinkie Pie Takes Home $60,000, Again at Pwnium 2

Pinkie Pie Takes Home $60,000, Again at Pwnium 2

Remember Pinkie Pie? He made another $60,000 the other day at Pwnium 2! and yes, he is still a teenager.

One Full Exploit, and Already Patched

Pinkie Pie took control of Chrome using a bug that qualifies as “full chrome exploit” and the team has pushed an updated with a fix, already. Here is the happy note from the Chrome team.

As part of our ongoing effort to reward exceptional vulnerability research in the security community, we hosted the Pwnium 2 competition at Hack in the Box 2012 in Kuala Lumpur yesterday.

We’re happy to confirm that we received a valid exploit from returning pwner, Pinkie Pie. This pwn relies on a WebKit Scalable Vector Graphics (SVG) compromise to exploit the renderer process and a second bug in the IPC layer to escape the Chrome sandbox. Since this exploit depends entirely on bugs within Chrome to achieve code execution, it qualifies for our highest award level as a “full Chrome exploit,” a $60,000 prize and free Chromebook.

One of Chrome’s most effective security defenses is our fast response time and ability to update users with critical patches, quickly. These bugs were no exception. We started analyzing the exploit as soon as it was submitted, and in fewer than 10 hours after Pwnium 2 concluded we were updating users with a freshly patched version of Chrome.

We’d like to thank Pinkie Pie for his hard work in assembling another great Pwnium submission. We’ll post an in-depth look at the bugs used and subsequent mitigations once other platforms have been patched.

chrome news  Pinkie Pie Takes Home $60,000, Again at Pwnium 2

via Chromium Blog.

Comments on this entry are closed.