Edouard Bochin retweeted
Exploiting the Undefined: PWNing Firefox by Settling its Promises by Tao Yan (@ga1ois) and Edouard Bochin (@le_douds)
3
22
Edouard Bochin retweeted
Aaaand the first talk to be announced is... 🥁 Exploiting the Undefined: PWNing Firefox by Settling its Promises by @ga1ois & @le_douds
1
4
1
45
Edouard Bochin retweeted
Congrats to @mozilla for being the first vendor to patch their #Pwn2Own bugs. Oh - and go update #Firefox to get the fixes. That's two years in a row Mozilla has been the fastest. Well done!
[ZDI-25-292|CVE-2025-4919] Mozilla Firefox SpiderMonkey Out-Of-Bounds Write Remote Code Execution Vulnerability (CVSS 8.8; Credit: Edouard Bochin (@le_douds) and Tao Yan (@Ga1ois) from Palo Alto Networks) zerodayinitiative.com/adviso…
12
75
Edouard Bochin retweeted
Very nice to come back again to Pwn2Own this year at Berlin, great job @le_douds. Time to get some rest : )
Excellent! Edouard Bochin (@le_douds) and Tao Yan (@Ga1ois) from Palo Alto Networks used an Out-of-Bounds Write to exploit #Mozilla Firefox. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own #P2OBerlin
5
1
23
Edouard Bochin retweeted
First blood: Mozilla Firefox pwned at first attempt (in less than 2 seconds) using an out-of-bounds write vulnerability by Edouard Bochin (@le_douds) and Tao Yan (@Ga1ois) from Palo Alto Networks.
There are two browser entries at #Pwn2Own Berlin 2025 both targeting "Mozilla Firefox". Let's see if it can be pwned.
5
2
25
Edouard Bochin retweeted
Really thrilled and truly honored to receive this year's Pwnie Award for Most Innovative Research with @le_douds. It's a wonderful wrap-up for our work. Can't wait to start the next journey of our research. Great thanks to @PwnieAwards! #defcon32
1
11
50
Edouard Bochin retweeted
We finished our presentation at #BHUSA and the slides were published here: i.blackhat.com/BH-US-24/Pres…, you can also find the latest slides and demo here: github.com/ga1ois/BlackHat-U…, enjoy, especially for our new "field confusion" V8 sbx escape technique : ) @le_douds @BlackHatEvents
#BHUSA We are glad our talk "Let the Cache Cache and Let the WebAssembly Assemble: Knockin’ on Chrome’s Shell" was accepted for Black Hat USA 2024, we'll disclose our #Chrome research demonstrated at #Pwn2Own 2024. Stay tuned : ) blackhat.com/us-24/briefings… @le_douds @BlackHatEvents
1
24
90
Edouard Bochin retweeted
#BHUSA We are glad our talk "Let the Cache Cache and Let the WebAssembly Assemble: Knockin’ on Chrome’s Shell" was accepted for Black Hat USA 2024, we'll disclose our #Chrome research demonstrated at #Pwn2Own 2024. Stay tuned : ) blackhat.com/us-24/briefings… @le_douds @BlackHatEvents
1
4
1
20
Edouard Bochin retweeted
Confirmed! @le_douds and @Ga1ois from Palo Alto used an OOB Read plus a novel technique for defeating V8 hardening to get arbitrary code execution in the renderer. The were aboe to exploit #Chrome and #Edge with the same bugs, earning $42,500 and 9 Master of Pwn points. #Pwn2Own
1
9
2
49