• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Zero Day Initiative   »   Pwn2Own 2017 – Day Two Schedule and Results

Pwn2Own 2017 – Day Two Schedule and Results

  • Posted on:March 15, 2017
  • Posted in:Zero Day Initiative
  • Posted by:
    Dustin Childs (Zero Day Initiative Communications)
0

With the unprecedented number of contestants and entries, the Zero Day Initiative is dividing today’s schedule into two tracks. The first track will focus on attempts against Microsoft and Adobe products. Track Two focuses on products from Apple and Mozilla. This allows ZDI to get through twice the number of contestants in a single day during our largest ever Pwn2Own. We’re thrilled at the level of participation for the 10th anniversary of Pwn2Own and look forward to awarding more than $1,000,000 USD in prizes.

The full schedule for Day Two is below (all times PDT). We will update this schedule with results as they become available.

TRACK A TRACK B
8:30am 360 Security (@mj0011sec) targeting Adobe Flash with a SYSTEM-level escalation and a virtual machine escape
SUCCESS: 360 Security (@mj0011sec) successfully exploits Adobe Flash and elevates to SYSTEM using 4 bugs. They did not complete the VMware escape bonus portion, but what they demonstrated constitutes a win and nets them $40,000 and 12 Master of Pwn points.
9:15am Tencent Security – Team Shield (Keen Lab and PC Mgr) targeting Apple macOS
WITHDRAW: The team has withdrawn this entry from the competition.
10:00am Tencent Security – Team Sniper (Keen Lab and PC Mgr) targeting Adobe Flash with a SYSTEM-level escalation
SUCCESS: Tencent Security – Team Sniper (Keen Lab and PC Mgr) successfully exploits Adobe Flash via a UAF and escalates to SYSTEM with a UAF in the Windows kernel. This earned them $40,000 and 12 points for Master of Pwn.
10:45am 360 Security (@mj0011sec) targeting Apple macOS
SUCCESS: The 360 Security (@mj0011sec) successfully elevates privileges on Apple macOS by using an infoleak and race condition in the kernel. In doing so, they garner $10,000 and 3 more points for Master of Pwn.
11:00am Tencent Security – Lance Team targeting Microsoft Edge with a SYSTEM-level escalation
SUCCESS: Tencent Security – Lance Team successfully exploits Microsoft Edge by using a UAF in Chakra then elevates to SYSTEM by using a UAF in Windows kernel. They earned themselves $55,000 and 13 Master of Pwn points.
11:45am 360 Security (@mj0011sec) targeting Apple Safari with an escalation to root on macOS
SUCCESS: The 360 Security (@mj0011sec) successfully exploited Apple Safari through an integer overflow and escalated to root using a macOS kernel UAF. This garners them $35,000 and 11 more Master of Pwn points.
1:00pm Tencent Security – Sword Team targeting Microsoft Edge
DISQUALIFIED: The entry from Tencent Security – Sword Team was disqualified for not using true 0-days. The bugs used were reported earlier in the contest by a separate Tencent team and are known by the vendor.
2:00pm Chaitin Security Research Lab (@ChaitinTech) targeting macOS
SUCCESS: The Chaitin Security Research Lab (@ChaitinTech) succeeds in elevating in macOS by using an infoleak and out-of-bounds bug in the macOS kernel. In doing so, they netted another $10,000 and 3 more Master of Pwn points.
2:30pm Tencent Security – Lance Team targeting Microsoft Windows
WITHDRAW: The team has withdrawn this entry from the competition.
3:00pm Tencent Security – Team Sniper (Keen Lab and PC Mgr) targeting Apple macOS
DISQUALIFIED: This entry from Tencent Security – Team Sniper (Keen Lab and PC Mgr) was disqualified for not using true 0-days. The bugs used were previously known by the vendor.
3:30pm Tencent Security – Team Shield (Keen Lab and PC Mgr) targeting Microsoft Edge with a SYSTEM-level escalation
WITHDRAW: The team has withdrawn this entry from the competition.
4:00pm Moritz Jodeit, Blue Frost Security (@moritzj) targeting Mozilla Firefox
​​​​​​​FAILURE: The contestant could not complete their exploit chain within the allotted time.
4:30pm Tencent Security – Team Sniper (Keen Lab and PC Mgr) targeting Microsoft Edge with a SYSTEM-level escalation
SUCCESS – The Tencent Security – Team Sniper (Keen Lab and PC Mgr) exploits Microsoft Edge with a SYSTEM-level escalation by using a UAF in Chakra and a UAF in the Windows kernel.
5:00pm Chaitin Security Research Lab (@ChaitinTech) targeting Mozilla Firefox with a SYSTEM-level escalation
SUCCESS: The Chaitin Security Research Lab (@ChaitinTech) team finish their Pwn2Own by exploiting Firefox with an integer overflow and escalating privileges through uninitialized buffer in the Windows kernel.
5:30pm 360 Security (@mj0011sec) targeting Microsoft Windows
SUCCESS: The 360 Security (@mj0011sec) successfully exploits Microsoft Windows with an out-of-bounds bug in the Windows kernel. Nets them $15,000 and 4 Master of Pwn points.
6:00pm Tencent Security – Team Sniper (Keen Lab and PC Mgr) targeting Apple Safari with an escalation to root on macOS
SUCCESS: Tencent Security – Team Sniper (Keen Lab and PC Mgr) exploits Safari with an integer overflow and escalates to root with an out-of-bounds UAF in WindowServer. This nets them $35,000 and 11 points for Master of Pwn.
7:00pm Tencent Security – Team Sniper (Keen Lab and PC Mgr) targeting Microsoft Windows
SUCCESS: The folks from Tencent Security – Team Sniper (Keen Lab and PC Mgr) elevated privileges in Microsoft Windows through an integer overflow in the kernel. This final act of Day Two earned them $15,000 and 4 points for Master of Pwn.

 

We’ll update this blog with results as they become available. Follow us on Twitter for the latest information, including a wrap of Day One and the schedule for Day Three.

Related posts:

  1. The Results – Pwn2Own 2017 Day Two
  2. Pwn2Own 2017 – Day Three Schedule and Results
  3. Welcome to Pwn2Own 2017 – The Schedule
  4. The Results – Pwn2Own 2017 Day One

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.