BlackBerry OS roughshod during the minute solar daytime of the Pwn2Own hacking rival equally a trial of a drive-by download assault that chained together several exploits.
The trio that managed to hack RIM's mobile operating system, Vincenzo Iozzo, Willem Pinckaers together with Ralf Philipp Weinmann, exploited 2 vulnerabilities inwards the open-source WebKit layout engine inwards society to produce it.
The assault was launched from a especially crafted spider web page that stole data similar contacts together with images from the device together with also wrote a file to the storage system.
The hackers chained together an exploit for an data disclosure põrnikas together with 1 for an integer overflow vulnerability, simply what's most impressive is that they did it without whatsoever documentation.
They didn't receive got access to whatsoever debugging tool, similar the ones available for other systems, that could receive got helped them create upward one's heed how the assault code interacts amongst the system. Instead, they had to rely on exploiting a carve upward põrnikas to read the device's memory.
"The BlackBerry is a organization no 1 knows anything about. We know there’s a browser together with a Java virtual machine. We had to assume that 1 time nosotros receive got over the browser, nosotros tin laissez passer on the sack instruct farther into the system," Vincenzo Iozzo told ZDNet.
The hackers' undertaking was easier because BlackBerry OS doesn't receive got ASLR or DEP, 2 safety mechanisms that would receive got made vulnerability exploitation of a lot harder.
RIM's manager of safety response, Adrian Stone, who was at the CanSecWest safety conference where Pwn2Own is taking place, confirmed that the companionship is looking to add together these technologies inwards time to come versions.
Apple, for example, has already implemented native ASLR inwards the novel iOS 4.3 released 2 days ago. That update did non brand to the rival though, because all configurations were frozen 2 weeks inwards advance.
The trio that managed to hack RIM's mobile operating system, Vincenzo Iozzo, Willem Pinckaers together with Ralf Philipp Weinmann, exploited 2 vulnerabilities inwards the open-source WebKit layout engine inwards society to produce it.
The assault was launched from a especially crafted spider web page that stole data similar contacts together with images from the device together with also wrote a file to the storage system.
The hackers chained together an exploit for an data disclosure põrnikas together with 1 for an integer overflow vulnerability, simply what's most impressive is that they did it without whatsoever documentation.
They didn't receive got access to whatsoever debugging tool, similar the ones available for other systems, that could receive got helped them create upward one's heed how the assault code interacts amongst the system. Instead, they had to rely on exploiting a carve upward põrnikas to read the device's memory.
"The BlackBerry is a organization no 1 knows anything about. We know there’s a browser together with a Java virtual machine. We had to assume that 1 time nosotros receive got over the browser, nosotros tin laissez passer on the sack instruct farther into the system," Vincenzo Iozzo told ZDNet.
The hackers' undertaking was easier because BlackBerry OS doesn't receive got ASLR or DEP, 2 safety mechanisms that would receive got made vulnerability exploitation of a lot harder.
RIM's manager of safety response, Adrian Stone, who was at the CanSecWest safety conference where Pwn2Own is taking place, confirmed that the companionship is looking to add together these technologies inwards time to come versions.
Apple, for example, has already implemented native ASLR inwards the novel iOS 4.3 released 2 days ago. That update did non brand to the rival though, because all configurations were frozen 2 weeks inwards advance.
Share This :
comment 0 Comments
more_vert