Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Researcher chains three exploits to take down IE8 at Pwn2Own

Gregg Keizer | March 10, 2011
Marks the first ever Pwn2Own escape from a browser sandbox

FRAMINGHAM 10 MARCH 2011 - An Irish security researcher today said it took him six weeks to craft a three-exploit package that brought Microsoft's Internet Explorer 8 (IE8) to its knees at Pwn2Own Wednesday.

Independent researcher Stephen Fewer walked off with $15,000 and a Sony notebook yesterday after hacking IE8 on Windows 7 by exploiting three unpatched vulnerabilities in the operating system and browser.

"It was a challenge, especially engineering the exploit that escaped Protected Mode," said Fewer today, referring to the "sandbox" that isolates IE8 from the rest of the computer.

The sandbox, like the one baked into Google's Chrome, is designed to hold malicious code within the browser so that it can't leak into the operating system or system as a whole.

"I spent about six weeks finding the vulnerabilities and engineering the exploits," Fewer said. "Then I decided to give [Pwn2Own] a go, and bought a plane ticket."

Fewer is a first-time Pwn2Own contestant and winner. He has a one-man consulting firm called Harmony Security, and is a long-time contributor to both the Metasploit open-source penetration testing toolkit project, and to HP TippingPoint's Zero Day Initiative (ZDI) bug bounty program, which pays researchers for finding and reporting vulnerabilities. TippingPoint is the sponsor of Pwn2Own.

Fewer chained three exploits together to bring down IE8, a feat that Aaron Portnoy, manager of TippingPoint's security research team and Pwn2Own's organizer, called "impressive" yesterday.

Two of the three were necessary to craft a reliable attack that sidestepped ASLR, for "address space layout randomization," and DEP, or "data execution prevention," on Windows 7. ASLR and DEP are technologies baked into Microsoft's operating system designed to make it more difficult for exploits to reliably execute.

The third exploit leveraged yet another bug to jump out of the Protected Mode sandbox.

"That was pretty difficult," said Fewer, talking about the sandbox-escape exploit. "It took quite a while to engineer that, and then there was the time pressure of the contest."

By escaping Protected Mode, Fewer was able to gain complete control over the Sony laptop running Windows 7, a point he proved by adding a file to the machine, mimicking a cybercriminal's insertion of additional malware.

Fewer's hack of IE was the first ever at Pwn2Own to bust out of a browser sandbox. Although Chrome also boasts an anti-exploit sandbox, that browser has never been breached at Pwn2Own.

Yesterday, one expected Chrome contestant was a no-show, while a team slated to go second decided to focus instead on an attack against RIM's BlackBerry OS later today.

 

1  2  Next Page 

Sign up for Computerworld eNewsletters.