Quantcast
Channel: botnets
Viewing all articles
Browse latest Browse all 527

TippingPoint DVLabs Provides Exclusive Security Coverage for Mobile Pwn2Own 0Day Vulnerabilities

$
0
0

Welcome back to Mobile Pwn2Own 2016, from the PacSecWest security conference in Tokyo, Japan!  This year’s contest featured two competitor teams; Tencent Keen Security Lab and MWR Labs.  Ultimately, Keen swept the contest and became “Master of Pwn” achieving two fully operational exploits and one partial exploit against Android and IOS.

DVLabs was onsite with ZDI again and spent quality time with the researchers discussing methods of exploitation, reviewing the multiple vulnerabilities, and ultimately writing detection logic for the Digital Vaccine filters which will be published in the upcoming DV package.

The following vulnerabilities will be addressed:

Google Chrome installing a rogue application as demonstrated on the Nexus 6p (ZDI-CAN-4179, ZDI-CAN-4180) Keen
Apple Safari installing a rogue application as demonstrated on the iPhone 6 (ZDI-CAN-4182) Keen
Google Chrome installing a rogue application as demonstrated on the Nexus 6p (ZDI-CAN-4185) MWR
Apple Safari information disclosure to leak photos as demonstrated on the iPhone 6 (ZDI-CAN-4187) Keen

Trend Micro TippingPoint is the sole vendor providing filter coverage for these zero-day vulnerabilities, allowing customers to apply “virtual patches” until the software vendors release true software patches.

For more details on the contest itself, please refer to the Trend Micro ZDI blog.


Viewing all articles
Browse latest Browse all 527

Trending Articles