TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Pwn2Own results for Wednesday (Day One)

52 pointsby gioiabout 11 years ago

4 comments

SiValabout 11 years ago
It appears that most of these attacks relied on exploiting the unfortunate design of C, which makes manual memory management the default and safe, managed memory the special case. It should be the reverse. Speed will always matter, but you don&#x27;t have to use risky, manual memory mgt everywhere to get speed; you just need it in the few spots where it makes a difference.<p>In the majority of places in your code, manual memory management gives you no benefit but does expose you to a possible vulnerability if you make a mistake. If the default, lazy option were to let the well-tested runtime do the job for you, yet you could do a little extra work and get manual override wherever you wanted, and manual override everywhere brought you essentially back to C, I think we would have much safer code without a noticeable loss of performance.<p>Edit: I just realized in the shower that I was saying &quot;memory management&quot; when I meant direct &quot;memory manipulation&quot; more generally. I&#x27;m including arrays accessed by memory address rather than by bounds-checked index, pointer arithmetic, etc., not just malloc and free.
评论 #7401500 未加载
评论 #7404012 未加载
评论 #7401418 未加载
评论 #7401539 未加载
conorhabout 11 years ago
Looks like day 2 happened already and had some pretty good exploits:<p><a href="http://www.pwn2own.com/2014/03/pwn2own-results-thursday-day-two/" rel="nofollow">http:&#x2F;&#x2F;www.pwn2own.com&#x2F;2014&#x2F;03&#x2F;pwn2own-results-thursday-day-...</a>
评论 #7401411 未加载
rwgabout 11 years ago
<i>At Pwn4Fun, Google delivered a very impressive exploit against Apple Safari launching Calculator as root on Mac OS X.</i><p>I&#x27;ll bet it was ocspd they exploited. The CRL handling code in libsecurity is awful, and ocspd runs as root without a sandbox profile.
评论 #7401191 未加载
sitkackabout 11 years ago
What this shows is that if you are using a machine connected to the internet, assume you have been rooted. If you are paranoid, do all of your surfing in a VM over Tor and reset that VM state after every launch.
评论 #7402442 未加载