MacNN Forums (
-   Mac News (
-   -   Chinese team successfully hacks Safari at Pwn2Own (

NewsPoster Mar 14, 2014 12:45 PM
Chinese team successfully hacks Safari at Pwn2Own
At this week's Pwn2Own hacking contest, a group calling itself the Chinese Keen Team successfully used two vulnerabilities to run arbitrary code through Safari, according to <em>ThreatPost</em>. The exploit is reported to have been executed via a flaw in Safari's WebKit engine and a bypass of the sandboxing in recent versions of OS X. One member of Keen, Liang Chen, comments however that OS X is "regarded as very safe and has a very good security architecture," and that what vulnerabilities there are are "very difficult to exploit."<br /><br />Representatives from Apple were in attendance at Pwn2Own, and are <a href="" rel='nofollow'>said</a> to have been informed of the exploits Keen used. Apple will likely incorporate fixes in the next updates for Safari and/or OS X. Other apps targeted at Pwn2Own events have included Chrome, Firefox, Flash, Adobe Reader, and Internet Explorer. All major web browsers eventually <a href="" rel='nofollow'>succumbed</a> during this year's contest.
All times are GMT -4. The time now is 04:46 PM.

Copyright © 2005-2007 MacNN. All rights reserved.
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2016, vBulletin Solutions, Inc.

Content Relevant URLs by vBSEO 3.3.2