I admit to having a preference for the attack on MySQL. The description:
“Are we there yet?” MySQL Authentication Bypass (CVE-2012-2122)
Credit: Sergei Golubchik
On vulnerable versions of MySQL simply asking to authenticate repeatedly enough times is enough to bypass authentication: “Can I log in as root now?” ”How about now?” ”Now?”
That said, the various nominees for Epic Ownage are pretty hilarious as well:
“Flame” Windows Update MD5 Collision Attack
Any attack that requires a breakthrough in cryptography to pull off is pretty cool in our book. And being able to pwn any Windows machine through Windows Update is pretty mass 0wnage.
It turns out that Certificate Authorities themselves are one massive security vulnerability. How many more CAs need to get popped before we as an industry realize that allowing Bob’s Bait, Tackle, and Certificates to issue wildcard certificates is a bad idea?
iPhone Dev Team and Chronic Dev Team
We love the jailbreakers and you should too. They publicly drop all of their exploits as 0day, convince millions of users to disable the security features on their own devices, and then keep those devices vulnerable to the released exploits until new exploits can be developed and released in the patched versions of iOS.
It’s been a ‘good’ year for massive security deficits. Check up on the Pwnies – and watch the various streams from the summer’s security conferences – to appreciate why pencil and paper (or, barring that, actual fiscal and legal liability for writing bad code) is an ever-appealing idea.