随后,团队又使用 Safari 浏览器的 Bug,再次攻破 iPhone 7,并获得了 4.5 万美元奖金和 12 个 Master of Pwn 点数。安全研究人员 Richard Zhu 表示,他可以利用这两个 bug 突破 Safari 浏览器后退出沙盒模式,并在 iPhone 7 上成功运行代码。这个操作为他带来了 2.5 万美元奖金和 10 个 Master of Pwn 点数。
除了 iPhone 7,研究人员还找到了 Galaxy S8 以及华为 Mate 9 Pro 的漏洞,拿走了 35 万美元奖金。移动 Pwn2Own 大会明天继续,相信安全人员会找到更多的 Bug,拿走更多的奖金。
iPhone 7: Tencent Keen Security Lab got code execution through a WiFi bug and escalates privileges to persist through a reboot. ($110,000).
Huawei Mate 9 Pro: Tencent Keen Security Lab uses a stack overflow in the Huawei baseband processor ($100,000).
Samsung Galaxy S8:360 Security (@mj0011sec) demonstrated a bug in the Samsung Internet Browser to get code execution, then leveraged a privilege escalation in a Samsung application, which persisted through a reboot ($70,000).
iPhone 7:Tencent Keen Security Lab used two bugs, one in the browser and one in a system service, to exploit Safari. ($45,000).
iPhone 7:Richard Zhu (fluorescence) leveraged two bugs to exploit Safari and escape the sandbox – successfully running code of his choice ($25,000).
稿源:cnBeta、MacX,封面源自 *** ;