Pwn2Own Toronto 2022 - Day Three Results
2022-12-9 00:5:27 Author: www.thezdi.com(查看原文) 阅读量:18 收藏

Welcome back to Pwn2Own Toronto! Yesterday, we awarded another $281,500 for 17 unique bugs across multiple categories. That brings our two-day total to $681,250 awarded for 46 unique 0-days. Today’s highlights include more attempts at the Samsung Galaxy, entries in the SOHO Smashup category, and more smart speaker. We’ll be updating this blog with results throughout the day.

Results current as of 12:30. All times Eastern (GMT-5). All denominations are in USD.

SUCCESS - On the first success of Day 3, Team Viettel was able to execute their OS Command Injection attack against the WD My Cloud Pro Series PR4100 in the NAS category. They earn $20K and 4 Master of Pwn points.

BUG COLLISION - STAR Labs was able to execute their SOHO SMASHUP attack on the 3rd and final try against the Synology router and the Canon printer. However, the exploits they used were seen previously in the competition. They still earn $25K and 5 Master of Pwn points.

SUCCESS - newcomer Chi Tran of Bun Bo Ong Chi was able to execute their stack based buffer overflow attack against the Canon imageCLASS MF743Cdw in the Printer category. They earn $10K and 2 Master of Pwn points.

Anyone else getting a hankering for noodles?

SUCCESS and BUG COLLISION - DEVCORE builds on their total with a partial win (1 unique + 1 known bug) to execute their stack-based buffer overflow + OOB Read attack against the Sonos One Speaker in the Smart Speaker category. They earn $22.5K and another 4.5 Master of Pwn points.


文章来源: https://www.thezdi.com/blog/2022/12/8/pwn2own-toronto-2022-day-three-results
如有侵权请联系:admin#unsafe.sh