Author Topic: Internet Explorer 8: Researcher hacks just-launched IE8  (Read 1175 times)

Offline riso

  • Administrator
  • Hero Member
  • *****
  • Posts: 6341
  • Gender: Male
  • Beta tester Tech support dedicated 110%
    • windows 10 news and info | Forum - Blog
Internet Explorer 8: Researcher hacks just-launched IE8
« on: March 20, 2009, 08:01:13 AM »

March 19, 2009  Just hours before Microsoft Corp. officially launched the final code for Internet Explorer 8, a German researcher yesterday hacked the browser during the PWN2OWN contest to win $5,000 and a Sony Viao laptop.
The researcher, a computer science student from Germany who would only give his first name, Nils, broke into the Sony within minutes by exploiting a previously unknown vulnerability in the new browser, said Terri Forslof, manager of security response at 3Com Corp.'s TippingPoint, the contest sponsor. The laptop was running what Forslof described as a "recent Microsoft internal build" of Windows 7.
Earlier today, Microsoft launched the final version of IE8 for Windows XP, Vista, Server 2003 and Server 2008. A final edition for Windows 7, however, has not been released to the public.
"It was important for Microsoft to see that bug right away," said Forslof today. "There are cases in product development where you might have a vulnerability so critical that [the vendor] makes the call to actually block the release. Microsoft needed to see that and evaluate that vulnerability."
TippingPoint purchases the vulnerabilities and the rights to the exploits when it awards cash prizes during PWN2OWN. At that point, it hands over the information to the vendor.
"This is the awesome part of PWN2OWN," said Forslof. "Microsoft got to stand there and watch it happen. They were right at ground zero." Within five minutes of Nils hacking IE8, TippingPoint had provided details and code to Mike Reavey, operations manager at the Microsoft Security Research Center (MSRC), who was at CanSecWest, the Vancouver, British Columbia, security conference that hosts PWN2OWN.
"They took it back to Microsoft and filed a bug," Forslof said. "That's a real success story. Microsoft had the opportunity to talk directly with Nils about the bug, and within five hours, they had it reproduced in their labs."
Microsoft refused to confirm the vulnerability, however, and used its usual phrasing when bugs go public. "Microsoft is investigating reports of a possible vulnerability in Internet Explorer 8," a spokeswoman said in an e-mail. "If the vulnerability is confirmed, we'll take action to help protect our customers."
The spokeswoman also declined to answer a question about whether Nils' vulnerability exists only in the Windows 7 build used at PWN2OWN, or in some or all of the versions released today. Her only comment along those lines: "The build of Internet Explorer 8 used in the contest yesterday was not the RTW build released today."
IE8 wasn't the only browser Nils hacked yesterday. After he took down IE8, he moved on to Apple Inc.'s Safari and Mozilla Corp.'s Firefox, both of which he successfully exploited with attack code he had created earlier. His total for the afternoon: $15,000 in cash from TippingPoint, and the Sony laptop.
"It was insane compared to last year," said Forslof, noting that at 2008's PWN2OWN, there were just two vulnerabilities disclosed. "Nils hit the IE8 vulnerability, and everybody thought that was it. Then he comes back and says, 'Do you mind if I try my Safari vulnerability? Oh, and by the way, I also have a Firefox bug'."
"After just two hours, we had four browser vulnerabilities and we'd paid out $20,000," Forslof said.
Before Nils took his shot at IE8, Charlie Miller successfully defended his title as PWN2OWN's 2008 first-prize winner by hacking Safari within seconds. Miller, who said he had been "really nervous" this year because of the crush of spectators, walked away with $5,000 and a MacBook notebook.
By the rules of the contest and TippingPoint's policies, details of the vulnerabilities are kept confidential until the vendor releases a patch. "We'll go through our normal investigations," said Forslof, "and we'll work in close coordination with the vendors."
TippingPoint is one of two security companies with a bug bounty program. The company's Zero Day Initiative, or ZDI, cash-for-crashes program does not disclose what it pays for a vulnerability, but in the past, it has offered bonuses as large as $20,000.
The PWN2OWN contest wraps up tomorrow, with browsers from Microsoft, Mozilla, Apple and Google Inc. still fair game. A second part of the challenge pits hackers against five smartphone operating systems: Windows Mobile, Google's Android, Symbian, and the operating systems used in the iPhone and the BlackBerry.