The eighteenth annual CanSecWest security conference is underway in downtown Vancouver, Canada, where researchers are competing in the 11th Pwn2Own computer hacking contest for over $2 million in prizes.
Day one results have already been published over at the Zero Day Initiative website, with a couple of successful Mac-related exploits already appearing in the list of achievements.
Samuel Groß of phoenhex returned to Pwn2Own to successfully hack Apple's desktop Safari browser. Groß used a JIT optimization bug in Safari, a macOS logic bug, and a kernel overwrite to execute code to successfully exploit the browser, earning himself $65,000 and six points towards Master of Pwn. The exploit also caused a text-based message to appear on a MacBook Pro's Touch Bar.
The achievement harks back to Groß's similar success at last year's event, where he targeted Safari with an escalation to root on macOS that allowed him and Niklas Baumstark to scroll a message on a MacBook Pro Touch Bar, earning them $28,000.
Another Safari exploit at Pwn2Own 2018 was initiated by Richard Zhu, who managed to bypass iPhone 7 security protocols with the help of two Safari bugs at November's Pwn2Own mobile event. However, this time Zhu failed to get his exploit chain working within the allotted 30-minute time limit.
Unfazed, Zhu returned to wow the crowd with a Microsoft Edge exploit that used two use-after-free (UAF) bugs in the browser and an integer overflow in the kernel to successfully run his code with elevated privileges. The dramatic effort against the ticking clock earned him $70,000 and seven points towards Master of Pwn.
Apple representatives have attended the Pwn2Own contest in the past, and affected parties are made aware of all security vulnerabilities discovered during the contest so that they can be patched in future software updates.
The participating teams earned a total of $162,000 in prizes on day one, and the event resulted in three Apple bugs, two Oracle bugs, and three Microsoft bugs. Pwn2Own day two begins today at 10:00 a.m. Pacific and will involve additional exploit attempts against macOS and Safari.
Update: On Pwn2Own Day 2, MWR Labs, a team consisting of Alex Plaskett, Georgi Geshev, and Fabi Beterke successfully used two Safari vulnerabilities to execute a sandbox escape. For the feat, they earned $55,000 and 5 Master of Pwn points.
In a separate attempt, Markus Gaasedelen, Nick Burnett, Patrick Biernat of Ret2 Systems, Inc. tried to target Safari using an elevation of privileges kernel exploit, but the team was unable to get the exploit working in the allotted time period.