Firefox and Edge Fall to Hackers on Day Two of Pwn2Own
2019-03-22T21:28:41
ID THREATPOST:2765AB7FFF03EDA0A1598E5DE31A3AD8 Type threatpost Reporter Tom Spring Modified 2019-03-22T21:28:41
Description
Hackers took down the Mozilla Firefox and Microsoft Edge browsers on Thursday at Pwn2Own, the annual hacking conference held in tandem with CanSecWest, as the competition continued for a second day.
The dynamic hacking duo of Amat Cama and Richard Zhu, which make up team Fluoroacetate, had another good day, following Wednesday’s successes. The two trained their skills first on Mozilla Firefox, leveraging a JIT bug in the browser, followed up by an out-of-bounds write exploit in the Windows kernel. The one-two punch allowed Fluoroacetate to take over the targeted system.
“They were able to execute code at SYSTEM level just by using Firefox to visit their specially crafted website,” wrote Zero Day Initiative in a write-up of the day’s hacking results. For their efforts the two earned $50,000.
> The @fluoroacetate duo does it again. They used a type confusion in #Edge, a race condition in the kernel, then an out-of-bounds write in #VMware to go from a browser in a virtual client to executing code on the host OS. They earn $130K plus 13 Master of Pwn points. pic.twitter.com/mD13kozJLv
>
> — Zero Day Initiative (@thezdi) March 21, 2019
The story of the day continued to be Cama and Zhu, who earned an additional $130,000 for a “masterfully crafted exploit chain” that eventually lead to the owning the underlying hypervisor of a VMware Workstation, ZDI reported.
That hack began on VMware Workstation where Fluoroacetate opened an Edge browser and visited a booby-trapped website that contained a confusion bug. Next, Cama and Zhu used a race condition in the Windows kernel followed by an out-of-bounds write in VMware workstation that linked to executing code on the underlying hypervisor.
Arthur Gerkis of Exodus Intelligence
Adding both day’s awards together, Fluoroacetate has so far earned $340,000 in the Pwn2Own competition this year.
Mozilla’s Firefox browser went down a second time Thursday, thanks to hacker Niklas Baumstark. He was able to execute code at the system level of a PC by leveraging a JIT bug in Firefox.
“In a real-world scenario, an attacker could use this to run their code on a target system at the level of the logged-on user,” ZDI wrote. The successful exploit earned Baumstark $40,000.
A researcher named Arthur Gerkis, with Exodus Intelligence, was the final contestant and a newcomer to the Pwn2Own competition. His target was also Microsoft’s Edge browser. “[Gerkis] wasted no time by using a double free bug in the renderer followed by a logic bug to bypass the sandbox,” ZDI wrote. For his effort, the researcher earned $50,000.
Day three of the competition closes out the Pwn2Own event with a automotive category.
{"id": "THREATPOST:2765AB7FFF03EDA0A1598E5DE31A3AD8", "hash": "f5dfffbd38f8c7882f1260790a6a7e51", "type": "threatpost", "bulletinFamily": "info", "title": "Firefox and Edge Fall to Hackers on Day Two of Pwn2Own", "description": "Hackers took down the Mozilla Firefox and Microsoft Edge browsers on Thursday at Pwn2Own, the annual hacking conference held in tandem with CanSecWest, as the competition continued for a second day.\n\nThe dynamic hacking duo of Amat Cama and Richard Zhu, which make up team [Fluoroacetate](<https://www.twitter.com/fluoroacetate>), had another good day, following [Wednesday\u2019s successes](<https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/>). The two trained their skills first on Mozilla Firefox, leveraging a JIT bug in the browser, followed up by an out-of-bounds write exploit in the Windows kernel. The one-two punch allowed Fluoroacetate to take over the targeted system.\n\n\u201cThey were able to execute code at SYSTEM level just by using Firefox to visit their specially crafted website,\u201d wrote Zero Day Initiative in a [write-up of the day\u2019s hacking results](<https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results>). For their efforts the two earned $50,000.\n\n> The [@fluoroacetate](<https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw>) duo does it again. They used a type confusion in [#Edge](<https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw>), a race condition in the kernel, then an out-of-bounds write in [#VMware](<https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw>) to go from a browser in a virtual client to executing code on the host OS. They earn $130K plus 13 Master of Pwn points. [pic.twitter.com/mD13kozJLv](<https://t.co/mD13kozJLv>)\n> \n> \u2014 Zero Day Initiative (@thezdi) [March 21, 2019](<https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw>)\n\nThe story of the day continued to be Cama and Zhu, who earned an additional $130,000 for a \u201cmasterfully crafted exploit chain\u201d that eventually lead to the owning the underlying hypervisor of a VMware Workstation, ZDI reported.\n\nThat hack began on VMware Workstation where Fluoroacetate opened an Edge browser and visited a booby-trapped website that contained a confusion bug. Next, Cama and Zhu used a race condition in the Windows kernel followed by an out-of-bounds write in VMware workstation that linked to executing code on the underlying hypervisor.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png>)\n\nArthur Gerkis of Exodus Intelligence\n\nAdding both day\u2019s awards together, Fluoroacetate has so far earned $340,000 in the Pwn2Own competition this year.\n\nMozilla\u2019s Firefox browser went down a second time Thursday, thanks to hacker Niklas Baumstark. He was able to execute code at the system level of a PC by leveraging a JIT bug in Firefox.\n\n\u201cIn a real-world scenario, an attacker could use this to run their code on a target system at the level of the logged-on user,\u201d ZDI wrote. The successful exploit earned Baumstark $40,000.\n\nA researcher named Arthur Gerkis, with Exodus Intelligence, was the final contestant and a newcomer to the Pwn2Own competition. His target was also Microsoft\u2019s Edge browser. \u201c[Gerkis] wasted no time by using a double free bug in the renderer followed by a logic bug to bypass the sandbox,\u201d ZDI wrote. For his effort, the researcher earned $50,000.\n\nDay three of the competition closes out the Pwn2Own event with a automotive category.\n", "published": "2019-03-22T21:28:41", "modified": "2019-03-22T21:28:41", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://threatpost.com/firefox-edge-pwn2own/143082/", "reporter": "Tom Spring", "references": ["https://www.twitter.com/fluoroacetate", "https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/", "https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results", "https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw", "https://t.co/mD13kozJLv", "https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw", "https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png"], "cvelist": [], "lastseen": "2019-11-03T07:09:56", "history": [{"bulletin": {"id": "THREATPOST:2765AB7FFF03EDA0A1598E5DE31A3AD8", "hash": "596f6bb51fdb7a1fa9bd2a18157fafa5", "type": "threatpost", "bulletinFamily": "info", "title": "Firefox and Edge Fall on Day Two of Pwn2Own", "description": "Hackers took down the Mozilla Firefox and Microsoft Edge browsers on Thursday at Pawn2Own, the annual hacking conference held in tandem with CanSecWest, as the competition continued for a second day.\n\nThe dynamic hacking duo of Amat Cama and Richard Zhu, which make up team [Fluoroacetate](<https://www.twitter.com/fluoroacetate>), had another good day, following [Wednesday\u2019s successes](<https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/>). The two trained their skills first on Mozilla Firefox, leveraging a JIT bug in the browser, followed up by an out-of-bounds write exploit in the Windows kernel. The one-two punch allowed Fluoroacetate to take over the targeted system.\n\n\u201cThey were able to execute code at SYSTEM level just by using Firefox to visit their specially crafted website,\u201d wrote Zero Day Initiative in a [write-up of the day\u2019s hacking results](<https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results>). For their efforts the two earned $50,000.\n\n> The [@fluoroacetate](<https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw>) duo does it again. They used a type confusion in [#Edge](<https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw>), a race condition in the kernel, then an out-of-bounds write in [#VMware](<https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw>) to go from a browser in a virtual client to executing code on the host OS. They earn $130K plus 13 Master of Pwn points. [pic.twitter.com/mD13kozJLv](<https://t.co/mD13kozJLv>)\n> \n> \u2014 Zero Day Initiative (@thezdi) [March 21, 2019](<https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw>)\n\nThe story of the day continued to be Cama and Zhu, who earned an additional $130,000 for a \u201cmasterfully crafted exploit chain\u201d that eventually lead to the owning the underlying hypervisor of a VMware Workstation, ZDI reported.\n\nThat hack began on VMware Workstation where Fluoroacetate opened an Edge browser and visited a booby-trapped website that contained a confusion bug. Next, Cama and Zhu used a race condition in the Windows kernel followed by an out-of-bounds write in VMware workstation that linked to executing code on the underlying hypervisor.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png>)\n\nArthur Gerkis of Exodus Intelligence\n\nAdding both day\u2019s awards together, Fluoroacetate has so far earned $340,000 in the Pawn2Own competition this year.\n\nMozilla\u2019s Firefox browser went down a second time Thursday, thanks to hacker Niklas Baumstark. He was able to execute code at the system level of a PC by leveraging a JIT bug in Firefox.\n\n\u201cIn a real-world scenario, an attacker could use this to run their code on a target system at the level of the logged-on user,\u201d ZDI wrote. The successful exploit earned Baumstark $40,000.\n\nA researcher named Arthur Gerkis, with Exodus Intelligence, was the final contestant and a newcomer to the Pwn2Own competition. His target was also Microsoft\u2019s Edge browser. \u201c[Gerkis] wasted no time by using a double free bug in the renderer followed by a logic bug to bypass the sandbox,\u201d ZDI wrote. For his effort, the researcher earned $50,000.\n\nDay three of the competition closes out the Pawn2Own event with a automotive category.\n", "published": "2019-03-22T16:28:41", "modified": "2019-03-22T16:28:41", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://threatpost.com/firefox-edge-pwn2own/143082/", "reporter": "Tom Spring", "references": ["https://www.twitter.com/fluoroacetate", "https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/", "https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results", "https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw", "https://t.co/mD13kozJLv", "https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw", "https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png"], "cvelist": [], "lastseen": "2019-03-22T20:33:37", "history": [], "viewCount": 3, "enchantments": {"score": {"value": 6.2, "vector": "NONE", "modified": "2019-03-22T20:33:37"}, "dependencies": {"references": [], "modified": "2019-03-22T20:33:37"}}, "objectVersion": "1.4"}, "lastseen": "2019-03-22T20:33:37", "differentElements": ["title"], "edition": 1}, {"bulletin": {"id": "THREATPOST:2765AB7FFF03EDA0A1598E5DE31A3AD8", "hash": "3a36adc2f274f74a2a4461202b62b98f", "type": "threatpost", "bulletinFamily": "info", "title": "Firefox and Edge Fall to Hackers on Day Two of Pwn2Own", "description": "Hackers took down the Mozilla Firefox and Microsoft Edge browsers on Thursday at Pawn2Own, the annual hacking conference held in tandem with CanSecWest, as the competition continued for a second day.\n\nThe dynamic hacking duo of Amat Cama and Richard Zhu, which make up team [Fluoroacetate](<https://www.twitter.com/fluoroacetate>), had another good day, following [Wednesday\u2019s successes](<https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/>). The two trained their skills first on Mozilla Firefox, leveraging a JIT bug in the browser, followed up by an out-of-bounds write exploit in the Windows kernel. The one-two punch allowed Fluoroacetate to take over the targeted system.\n\n\u201cThey were able to execute code at SYSTEM level just by using Firefox to visit their specially crafted website,\u201d wrote Zero Day Initiative in a [write-up of the day\u2019s hacking results](<https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results>). For their efforts the two earned $50,000.\n\n> The [@fluoroacetate](<https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw>) duo does it again. They used a type confusion in [#Edge](<https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw>), a race condition in the kernel, then an out-of-bounds write in [#VMware](<https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw>) to go from a browser in a virtual client to executing code on the host OS. They earn $130K plus 13 Master of Pwn points. [pic.twitter.com/mD13kozJLv](<https://t.co/mD13kozJLv>)\n> \n> \u2014 Zero Day Initiative (@thezdi) [March 21, 2019](<https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw>)\n\nThe story of the day continued to be Cama and Zhu, who earned an additional $130,000 for a \u201cmasterfully crafted exploit chain\u201d that eventually lead to the owning the underlying hypervisor of a VMware Workstation, ZDI reported.\n\nThat hack began on VMware Workstation where Fluoroacetate opened an Edge browser and visited a booby-trapped website that contained a confusion bug. Next, Cama and Zhu used a race condition in the Windows kernel followed by an out-of-bounds write in VMware workstation that linked to executing code on the underlying hypervisor.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png>)\n\nArthur Gerkis of Exodus Intelligence\n\nAdding both day\u2019s awards together, Fluoroacetate has so far earned $340,000 in the Pawn2Own competition this year.\n\nMozilla\u2019s Firefox browser went down a second time Thursday, thanks to hacker Niklas Baumstark. He was able to execute code at the system level of a PC by leveraging a JIT bug in Firefox.\n\n\u201cIn a real-world scenario, an attacker could use this to run their code on a target system at the level of the logged-on user,\u201d ZDI wrote. The successful exploit earned Baumstark $40,000.\n\nA researcher named Arthur Gerkis, with Exodus Intelligence, was the final contestant and a newcomer to the Pwn2Own competition. His target was also Microsoft\u2019s Edge browser. \u201c[Gerkis] wasted no time by using a double free bug in the renderer followed by a logic bug to bypass the sandbox,\u201d ZDI wrote. For his effort, the researcher earned $50,000.\n\nDay three of the competition closes out the Pawn2Own event with a automotive category.\n", "published": "2019-03-22T16:28:41", "modified": "2019-03-22T16:28:41", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://threatpost.com/firefox-edge-pwn2own/143082/", "reporter": "Tom Spring", "references": ["https://www.twitter.com/fluoroacetate", "https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/", "https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results", "https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw", "https://t.co/mD13kozJLv", "https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw", "https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png"], "cvelist": [], "lastseen": "2019-03-22T21:04:03", "history": [], "viewCount": 87, "enchantments": {"score": {"value": 6.1, "vector": "NONE", "modified": "2019-03-22T21:04:03"}, "dependencies": {"references": [], "modified": "2019-03-22T21:04:03"}}, "objectVersion": "1.4"}, "lastseen": "2019-03-22T21:04:03", "differentElements": ["description"], "edition": 2}, {"bulletin": {"id": "THREATPOST:2765AB7FFF03EDA0A1598E5DE31A3AD8", "hash": "5c47feaa1056784b533450ff516ff31d", "type": "threatpost", "bulletinFamily": "info", "title": "Firefox and Edge Fall to Hackers on Day Two of Pwn2Own", "description": "Hackers took down the Mozilla Firefox and Microsoft Edge browsers on Thursday at Pwn2Own, the annual hacking conference held in tandem with CanSecWest, as the competition continued for a second day.\n\nThe dynamic hacking duo of Amat Cama and Richard Zhu, which make up team [Fluoroacetate](<https://www.twitter.com/fluoroacetate>), had another good day, following [Wednesday\u2019s successes](<https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/>). The two trained their skills first on Mozilla Firefox, leveraging a JIT bug in the browser, followed up by an out-of-bounds write exploit in the Windows kernel. The one-two punch allowed Fluoroacetate to take over the targeted system.\n\n\u201cThey were able to execute code at SYSTEM level just by using Firefox to visit their specially crafted website,\u201d wrote Zero Day Initiative in a [write-up of the day\u2019s hacking results](<https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results>). For their efforts the two earned $50,000.\n\n> The [@fluoroacetate](<https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw>) duo does it again. They used a type confusion in [#Edge](<https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw>), a race condition in the kernel, then an out-of-bounds write in [#VMware](<https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw>) to go from a browser in a virtual client to executing code on the host OS. They earn $130K plus 13 Master of Pwn points. [pic.twitter.com/mD13kozJLv](<https://t.co/mD13kozJLv>)\n> \n> \u2014 Zero Day Initiative (@thezdi) [March 21, 2019](<https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw>)\n\nThe story of the day continued to be Cama and Zhu, who earned an additional $130,000 for a \u201cmasterfully crafted exploit chain\u201d that eventually lead to the owning the underlying hypervisor of a VMware Workstation, ZDI reported.\n\nThat hack began on VMware Workstation where Fluoroacetate opened an Edge browser and visited a booby-trapped website that contained a confusion bug. Next, Cama and Zhu used a race condition in the Windows kernel followed by an out-of-bounds write in VMware workstation that linked to executing code on the underlying hypervisor.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png>)\n\nArthur Gerkis of Exodus Intelligence\n\nAdding both day\u2019s awards together, Fluoroacetate has so far earned $340,000 in the Pwn2Own competition this year.\n\nMozilla\u2019s Firefox browser went down a second time Thursday, thanks to hacker Niklas Baumstark. He was able to execute code at the system level of a PC by leveraging a JIT bug in Firefox.\n\n\u201cIn a real-world scenario, an attacker could use this to run their code on a target system at the level of the logged-on user,\u201d ZDI wrote. The successful exploit earned Baumstark $40,000.\n\nA researcher named Arthur Gerkis, with Exodus Intelligence, was the final contestant and a newcomer to the Pwn2Own competition. His target was also Microsoft\u2019s Edge browser. \u201c[Gerkis] wasted no time by using a double free bug in the renderer followed by a logic bug to bypass the sandbox,\u201d ZDI wrote. For his effort, the researcher earned $50,000.\n\nDay three of the competition closes out the Pwn2Own event with a automotive category.\n", "published": "2019-03-22T16:28:41", "modified": "2019-03-22T16:28:41", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://threatpost.com/firefox-edge-pwn2own/143082/", "reporter": "Tom Spring", "references": ["https://www.twitter.com/fluoroacetate", "https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/", "https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results", "https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw", "https://t.co/mD13kozJLv", "https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw", "https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png"], "cvelist": [], "lastseen": "2019-03-23T20:13:12", "history": [], "viewCount": 208, "enchantments": {"score": {"value": 6.1, "vector": "NONE", "modified": "2019-03-23T20:13:12"}, "dependencies": {"references": [], "modified": "2019-03-23T20:13:12"}}, "objectVersion": "1.4"}, "lastseen": "2019-03-23T20:13:12", "differentElements": ["modified", "published"], "edition": 3}, {"bulletin": {"id": "THREATPOST:2765AB7FFF03EDA0A1598E5DE31A3AD8", "hash": "9d88bfab42c91dedcbd27becde252492", "type": "threatpost", "bulletinFamily": "info", "title": "Firefox and Edge Fall to Hackers on Day Two of Pwn2Own", "description": "Hackers took down the Mozilla Firefox and Microsoft Edge browsers on Thursday at Pwn2Own, the annual hacking conference held in tandem with CanSecWest, as the competition continued for a second day.\n\nThe dynamic hacking duo of Amat Cama and Richard Zhu, which make up team [Fluoroacetate](<https://www.twitter.com/fluoroacetate>), had another good day, following [Wednesday\u2019s successes](<https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/>). The two trained their skills first on Mozilla Firefox, leveraging a JIT bug in the browser, followed up by an out-of-bounds write exploit in the Windows kernel. The one-two punch allowed Fluoroacetate to take over the targeted system.\n\n\u201cThey were able to execute code at SYSTEM level just by using Firefox to visit their specially crafted website,\u201d wrote Zero Day Initiative in a [write-up of the day\u2019s hacking results](<https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results>). For their efforts the two earned $50,000.\n\n> The [@fluoroacetate](<https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw>) duo does it again. They used a type confusion in [#Edge](<https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw>), a race condition in the kernel, then an out-of-bounds write in [#VMware](<https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw>) to go from a browser in a virtual client to executing code on the host OS. They earn $130K plus 13 Master of Pwn points. [pic.twitter.com/mD13kozJLv](<https://t.co/mD13kozJLv>)\n> \n> \u2014 Zero Day Initiative (@thezdi) [March 21, 2019](<https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw>)\n\nThe story of the day continued to be Cama and Zhu, who earned an additional $130,000 for a \u201cmasterfully crafted exploit chain\u201d that eventually lead to the owning the underlying hypervisor of a VMware Workstation, ZDI reported.\n\nThat hack began on VMware Workstation where Fluoroacetate opened an Edge browser and visited a booby-trapped website that contained a confusion bug. Next, Cama and Zhu used a race condition in the Windows kernel followed by an out-of-bounds write in VMware workstation that linked to executing code on the underlying hypervisor.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png>)\n\nArthur Gerkis of Exodus Intelligence\n\nAdding both day\u2019s awards together, Fluoroacetate has so far earned $340,000 in the Pwn2Own competition this year.\n\nMozilla\u2019s Firefox browser went down a second time Thursday, thanks to hacker Niklas Baumstark. He was able to execute code at the system level of a PC by leveraging a JIT bug in Firefox.\n\n\u201cIn a real-world scenario, an attacker could use this to run their code on a target system at the level of the logged-on user,\u201d ZDI wrote. The successful exploit earned Baumstark $40,000.\n\nA researcher named Arthur Gerkis, with Exodus Intelligence, was the final contestant and a newcomer to the Pwn2Own competition. His target was also Microsoft\u2019s Edge browser. \u201c[Gerkis] wasted no time by using a double free bug in the renderer followed by a logic bug to bypass the sandbox,\u201d ZDI wrote. For his effort, the researcher earned $50,000.\n\nDay three of the competition closes out the Pwn2Own event with a automotive category.\n", "published": "2019-03-22T20:28:41", "modified": "2019-03-22T20:28:41", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://threatpost.com/firefox-edge-pwn2own/143082/", "reporter": "Tom Spring", "references": ["https://www.twitter.com/fluoroacetate", "https://threatpost.com/hackers-take-down-safari-vmware-and-oracle-at-pwn2own/143042/", "https://www.zerodayinitiative.com/blog/2019/3/21/pwn2own-vancouver-2019-day-two-results", "https://twitter.com/fluoroacetate?ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/Edge?src=hash&ref_src=twsrc%5Etfw", "https://twitter.com/hashtag/VMware?src=hash&ref_src=twsrc%5Etfw", "https://t.co/mD13kozJLv", "https://twitter.com/thezdi/status/1108812191996628992?ref_src=twsrc%5Etfw", "https://media.threatpost.com/wp-content/uploads/sites/103/2019/03/22160235/Pwn2own-2019-day-two-2.png"], "cvelist": [], "lastseen": "2019-04-25T05:44:20", "history": [], "viewCount": 208, "enchantments": {"score": {"value": 1.2, "vector": "NONE", "modified": "2019-04-25T05:44:20"}, "dependencies": {"references": [], "modified": "2019-04-25T05:44:20"}}, "objectVersion": "1.4"}, "lastseen": "2019-04-25T05:44:20", "differentElements": ["modified", "published"], "edition": 4}], "viewCount": 208, "enchantments": {"score": {"value": 1.2, "vector": "NONE", "modified": "2019-11-03T07:09:56"}, "dependencies": {"references": [], "modified": "2019-11-03T07:09:56"}, "vulnersScore": 1.2}, "objectVersion": "1.4", "_object_type": "robots.models.threatpost.ThreatpostBulletin", "_object_types": ["robots.models.threatpost.ThreatpostBulletin", "robots.models.base.Bulletin"]}