Apple’s Safari and Microsoft’s Internet Explorer (IE) both fell to the first hackers who tried their luck on the browsers at Wednesday’s opening day of Pwn2Own.
The hacking challenge kicked off at 3:30 p.m. PT, slightly later than scheduled, at the CanSecWest security conference, which runs March 9-11 in Vancouver, British Columbia.
A team from the French security company Vupen walked off with $15,000 and a new MacBook Air after exploiting an unpatched vulnerability in Safari.
Earlier Wednesday, Apple updated Safarito version 5.0.4, fixing 62 vulnerabilities. But Vupen was still able to break the browser.
“Apple has just released Safari 5.0.4 and iOS 4.3 a few minutes before the Pwn2Own contest,” Vupen said Wednesday afternoon on its Twitter account several hours before the contest began. “This breaks some exploits but not all!!”
HP TippingPoint, the security company that sponsors Pwn2Own, said earlier Wednesday that the last-minute Safari updates could affect who was awarded prize money.
TippingPoint’s Peter Vreugdenhil said the browsers were “frozen” two weeks before today’s tip-off with the then-current versions of Safari, Google’s Chrome 9, Microsoft’s IE8 and Mozilla’s Firefox 3.6, to give researchers a stationary target.
“Exploit development does sometimes rely on certain versions and that is the reason we have frozen the devices,” Vreugdenhil said in an e-mail Wednesday.
But the Safari patches still had a part to play in Vupen winning. If the vulnerability used by Vupen to hack Safari had been fixed in 5.0.4, TippingPoint would not have awarded the $15,000 prize.
Instead, the money would have gone to the first researcher who exploited the “frozen” version of Safari—5.0.3 was on the MacBook Air—using a bug still present in Wednesday’s update.