lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <C1D27240.1734D%simon@snosoft.com>
Date: Tue, 16 Jan 2007 12:14:56 -0500
From: Simon Smith <simon@...soft.com>
To: contributor <Contributor@...fense.com>,
	Untitled <full-disclosure@...ts.grok.org.uk>,
	<bugtraq@...urityfocus.com>
Subject: Re: [Full-disclosure] iDefense Q-1 2007 Challenge

I know someone who will pay significantly more per vulnerability against the
same targets. 


On 1/10/07 12:27 PM, "contributor" <Contributor@...fense.com> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
Also available at:


> http://labs.idefense.com/vcp/challenge.php#more_q1+2007%3A+vulnerability+chall
> enge

*Challenge Focus: Remote Arbitrary Code Execution Vulnerabilities
> in
Vista & IE 7.0*

Both Microsoft Internet Explorer and Microsoft Windows
> dominate their
respective markets, and it is not surprising that the decision
> to
update to the current release of Internet Explorer 7.0 and/or Windows
Vista
> is fraught with uncertainty.  Primary in the minds of IT
security
> professionals is the question of vulnerabilities that may be
present in these
> two groundbreaking products.

To help assuage this uncertainty, iDefense Labs
> is pleased to announce
the Q1, 2007 quarterly challenge.

Remote Arbitrary
> Code Execution Vulnerabilities in Vista and IE 7.0

Vulnerability
> Challenge:
iDefense will pay $8,000 for each submitted vulnerability that
> allows
an attacker to remotely exploit and execute arbitrary code on either
of
> these two products.  Only the first submission for a given
vulnerability will
> qualify for the award, and iDefense will award no
more than six payments of
> $8000.  If more than six submissions
qualify, the earliest six submissions
> (based on submission date and
time) will receive the award.  The iDefense Team
> at VeriSign will be
responsible for making the final determination of whether
> or not a
submission qualifies for the award.  The criteria for this phase
> of
the challenge are:

I) Technologies Covered:
- -    Microsoft Internet
> Explorer 7.0
- -    Microsoft Windows Vista

II) Vulnerability Challenge
> Ground Rules:
- -    The vulnerability must be remotely exploitable and must
> allow
arbitrary code execution in a default installation of one of
> the
technologies listed above
- -    The vulnerability must exist in the
> latest version of the
affected technology with all available patches/upgrades
> applied
- -    'RC' (Release candidate), 'Beta', 'Technology Preview'
> and
similar versions of the listed technologies are not included in
> this
challenge
- -    The vulnerability must be original and not previously
> disclosed
either publicly or to the vendor by another party
- -    The
> vulnerability cannot be caused by or require any additional
third party
> software installed on the target system
- -    The vulnerability must not
> require additional social engineering
beyond browsing a malicious
> site

Working Exploit Challenge:
In addition to the $8000 award for the
> submitted vulnerability,
iDefense will pay from $2000 to $4000 for working
> exploit code that
exploits the submitted vulnerability.  The arbitrary code
> execution
must be of an uploaded non-malicious payload.  Submission of
> a
malicious payload is grounds for disqualification from this phase of
the
> challenge.

I) Technologies Covered:
- -    Microsoft Internet Explorer 7.0
-
> -    Microsoft Windows Vista

II) Working Exploit Challenge Ground
> Rules:
Working exploit code must be for the submitted vulnerability only
> ­
iDefense will not consider exploit code for existing vulnerabilities
or new
> vulnerabilities submitted by others.  iDefense will consider
one and only one
> working exploit for each original vulnerability
submitted.

The minimum award
> for a working exploit is $2000.  In addition to the
base award, additional
> amounts up to $4000 may be awarded based upon:
- -    Reliability of the
> exploit
- -    Quality of the exploit code
- -    Readability of the exploit
> code
- -    Documentation of the exploit code


-----BEGIN PGP
> SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32)
Comment: Using GnuPG with
> Mozilla - http://enigmail.mozdev.org

> 
iD8DBQFFpSHsYcX4JiqFDSgRAl+ZAJwMJaZoJ6zwd4m8qZfviOZnNNUVrACgpaTU
QkO9IXq+PsC6
> bMKg7j6Dwfw=
=N0am
-----END PGP
> SIGNATURE-----

_______________________________________________
Full-Disclosur
> e - We believe in it.
Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by
> Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ