Pwn2Own Vancouver 2019: Day Two Schedule Results and Live Results
March 21, 2019 | Dustin ChildsWelcome to Day Two of Pwn2Own Vancouver 2019. Our first day saw $240,000 USD awarded for 9 bugs, and today’s targets could result in another $270,000 USD awarded. Below is today’s schedule. We will be updating this blog with results throughout the contest.
Day Two
1000 - Fluoroacetate (Amat Cama and Richard Zhu) targeting Mozilla Firefox with a kernel escalation in the web browser category.
Success: - The Fluoroacetate team used a bug in JIT along with an out-of-bounds write in the Windows kernel to earn themselves $50,000 and 5 Master of Pwn points.
1130 - Fluoroacetate (Amat Cama and Richard Zhu) targeting Microsoft Edge with a kernel escalation and a VMware escape in the web browser category.
Success: - The Fluoroacetate team used a comibnation of a type confusion in Edge, a race condition in the kernel, and finally a out-of-bounds write in VMware to go from a browser in a virtual client to executing code on the host OS. They earn $130,000 plus 13 Master of Pwn points.
1400 - Niklas Baumstark targeting Mozilla Firefox with a sandbox escape in the web browser category.
Success: - Niklas used a JIT bug in Firefox followed by a logic bug for the sandbox escape. The successful demonstration earned him $40,000 and 4 Master of Pwn points.
1530 - Arthur Gerkis of Exodus Intelligence targeting Microsoft Edge with a sandbox escape in the web browser category.
Success: - In his Pwn2Own debut, Arthur used a double free in the render and logic bug to bypass the sandbox. The effort earned him $50,000 and 5 points towards Master of Pwn.
We’ll update this blog with results throughout the day and recap each day’s events in a separate post. You can also find the latest results by following our Twitter feed. Best of luck to all of our contestants!