Mozilla fixes two Firefox zero-day bugs exploited at Pwn2Own

  • March 22, 2024
  •  
  • 01:45 PM
  •  
  • 2

Firefox

Mozilla has released security updates to fix two zero-day vulnerabilities in the Firefox web browser exploited during the Pwn2Own Vancouver 2024 hacking competition.

Manfred Paul (@_manfp) earned a $100,000 award and 10 Master of Pwn points after exploiting an out-of-bounds (OOB) write flaw (CVE-2024-29944) to gain remote code execution and escaping Mozilla Firefox's sandbox using an exposed dangerous function weakness (CVE-2024-29943).

Mozilla describes the first vulnerability as a privileged JavaScript execution via event handlers that could enable an attacker to execute arbitrary code in the parent process of the Firefox Desktop web browser.

The second one can let attackers access a JavaScript object out-of-bounds by exploiting range-based bounds check elimination on vulnerable systems.

"An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination," Mozilla explained.

Mozilla fixed the security flaws in Firefox 124.0.1 and Firefox ESR 115.9.1 to block potential remote code execution attacks targeting unpatched web browsers on desktop devices.

Manfred Paul Firefox exploit

​The two security vulnerabilities were patched only one day after Manfred Paul exploited and reported them at the Pwn2Own hacking contest.

However, after the Pwn2Own competition, vendors usually take their time to release patches as they have 90 days to push fixes until Trend Micro's Zero Day Initiative publicly discloses them.

Pwn2Own 2024 Vancouver ended on March 22 after security researchers earned $1,132,500 for 29 zero-day exploits and exploit chains demonstrated over the two days of the contest.

Manfred Paul won this year's edition with 25 Master of Pwn points and $202,500 in cash prizes after also hacking the Apple Safari, Google Chrome, and Microsoft Edge web browsers.

On the first day, he gained remote code execution (RCE) in Safari via a PAC bypass and an integer underflow bug zero-day combo. He also demoed a double-tap RCE exploit targeting an Improper Validation of Specified Quantity in Input weakness to take down Chrome and Edge.

ZDI has awarded a total of $3,494,750 and two Tesla Model 3 cars during the last three Pwn2Own hacking contests (TorontoTokyo Automotive, and Vancouver).

Αναζήτηση
Κατηγορίες
Διαβάζω περισσότερα
Fake job interviews target developers with new Python backdoor
April 26, 2024   10:20 AM   1 A new campaign tracked as “Dev...
από AFFA 2024-04-26 18:04:42 0 23
Hackers exploit Windows SmartScreen flaw to drop DarkGate malware
March 13, 2024   05:26 PM   1 A new wave of attacks by the...
από AFFA 2024-03-14 15:50:10 0 110
Notepad gets spellcheck and autocorrect in Windows 11
Microsoft’s Notepad underwent many changes to stay relevant in Windows 11. But despite...
από AFFA 2024-03-25 16:12:55 0 123
Microsoft pulls fix for Outlook bug behind ICS security alerts
April 23, 2024   05:50 PM   0 Microsoft has rolled back a fix for...
από AFFA 2024-04-24 17:44:34 0 34
Switzerland: Play ransomware leaked 65,000 government documents
March 7, 2024   03:27 PM   1 The National Cyber Security Centre...
από AFFA 2024-03-08 16:05:17 0 104