Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Apple Patch Released, But Is It Enough? 338

entenman writes "Apple Computer's security update train rumbled into the station with fixes for a whopping 43 Mac OS X and QuickTime vulnerabilities. The Security Update patches 31 flaws in the Mac OS X, most of them serious enough to cause 'arbitrary code execution attacks.'" Unfortunately, InfoWorldMike writes "InfoWorld.com reports that Independent researcher Tom Ferris said there were still holes in Safari, QuickTime, and iTunes that he reported to Apple but were not patched in the latest release on Thursday. Ferris told InfoWorld he is considering releasing the details of the unpatched holes on May 14 on his Web site. He also says he has found new holes in OS X affecting TIFF format files and BOMArchiver, an application used to compress files. He did not provide details about the flaws or proof of their existence."
This discussion has been archived. No new comments can be posted.

Apple Patch Released, But Is It Enough?

Comments Filter:
  • Stupidity (Score:5, Insightful)

    by Phroggy ( 441 ) * <slashdot3@ p h roggy.com> on Saturday May 13, 2006 @02:22PM (#15325651) Homepage
    and there is debate about whether Apple's shift to the same Intel architecture used by Microsoft Windows will change the security posture of Mac systems.

    Let's settle this debate.

    No.

    Changing CPU architectures will have absolutely effect on security.

    Switching to Intel will make it easier for game developers to port their code, which will lead to more games available for the Mac. This, combined with the ability to dual-boot to Windows and eventually the ability to run Windows apps through virtualization, makes the Mac platform more appealing to consumers, which will probably lead to an increase in Apple's market share. This could lead to more malware creators taking an interest in the Mac platform, which would lead to more security holes in Mac OS X being exploited (which is not the same as more security holes existing).
  • Comment removed (Score:4, Insightful)

    by account_deleted ( 4530225 ) on Saturday May 13, 2006 @02:26PM (#15325670)
    Comment removed based on user account deletion
  • Re:What purpose? (Score:4, Insightful)

    by Phroggy ( 441 ) * <slashdot3@ p h roggy.com> on Saturday May 13, 2006 @02:27PM (#15325681) Homepage
    What purpose would publishing the details on his site serve, other than as a kind of security vulnerability "first post!" type of thing?

    In theory, it's possible that black-hats have already discovered the flaw, and will exploit it without telling anyone. If they've already figured it out, then releasing details to the public won't make the situation significantly worse. However, public embarassment will prompt the company to release a fix more quickly.

    I'm not saying I agree with this theory.
  • Re:Stupidity (Score:5, Insightful)

    by Anonymous Coward on Saturday May 13, 2006 @02:30PM (#15325698)
    I think you underestimate the importance of assembly language when coding exploits. There are plenty of crackers out there who know x86 ASM. There are *far* fewer who know PPC ASM.

    You have to make the initial exploit to get "in." Once you are in you can use most standard unix libraries to do whatever you want. The hard part with PPC was finding someone who knew how to code the inital exploiit and the carefully crafted shellcode (with no null bytes, etc.). With Mac moving to Intel this part is MUCh easier for the people who know x86 ASM.
  • Re:what a ego (Score:2, Insightful)

    by 0racle ( 667029 ) on Saturday May 13, 2006 @02:31PM (#15325702)
    Yet when MS, Oracle or Cisco ask that security researchers hold back found flaws until they can fix them Slashdot gets all up in arms about them trying to stifle researchers.

    I guess Apple is still small enough that they can do no wrong.
  • by noidentity ( 188756 ) on Saturday May 13, 2006 @02:37PM (#15325728)
    from the updater notes: " When Safari's "Open `safe' files after downloading" option is enabled, archives will be automatically expanded. If the archive contains a symbolic link, the target symlink may be moved to the user's desktop and launched."

    OK, second time this "Open 'safe' files is a lie. WHY THE HELL IS THAT OPTION STILL THERE?" I never trusted that open from the moment I first saw the checkbox. I guess that's why they put "safe" in quotes. Buy our "free" product for only $9.95!
  • Re:Relativity (Score:5, Insightful)

    by Golias ( 176380 ) on Saturday May 13, 2006 @02:37PM (#15325734)
    Whoever modded you down "Troll" has obviously not heard of sarcasm.

    Anyway. The difference between Mac OS X and XP can be summarized thus:

    Every time a potential breach of OS X security is discovered, it's front-page headline news on Slashdot.

    If a new actual virus or worm comes along for Windows, making it ever more sure that you still can't even put a new Windows box online to download patches until after the patches you need are already installed... it's business as usual.

    Windows users concerned about they penis size go on chanting "B B B But that's only because the Mac is less popular, so nobody bothers to write malware for it. Wait until the Mac gets more popular, then you'll be in a world of hurt!!!1!"

    Whatever. The Mac is probably never going to see double-digit market share, and even if it does, it's still vastly more secure than Windows is, and you all know it. So there's no need to worry about such a scenario ever happening.

    So I use Macs.

    If the market dominance of Windows has anything to do with Macs being relatively free of haX0r attention, then I just gotta say to all you stubborn Windows users out there:

    Hey man, thanks for taking one for the team.
  • Is it enough? Yes. (Score:4, Insightful)

    by sootman ( 158191 ) on Saturday May 13, 2006 @02:39PM (#15325741) Homepage Journal
    Considering that there has not been one real, severe, in-the-wild, massively spread, substantial, damage-causing virus in the five year history of Mac OS X, I would say yes, the boys and girls in Cupertino are doing just fine. Thank you very much for all your hard work, and all naysaying columnists and pundits can go screw.
  • Sue Sue Sudio (Score:1, Insightful)

    by Frankie70 ( 803801 ) on Saturday May 13, 2006 @02:39PM (#15325745)
    Ferris told InfoWorld he is considering releasing the details of the unpatched holes on May 14 on his Web site.


    Apple will then just have to take him to court like they do with everybody else, won't they?
  • by ShyGuy91284 ( 701108 ) on Saturday May 13, 2006 @02:40PM (#15325747)
    The way I see it, they probably intend on patching the other problems, but they decided to get a decent amount done, and then release the update. Much like how Microsoft's once-a-month releases could give some time for the vulnerabilities to be taken advantage of (I recall that release cycle, I'm not sure if they are still done anymore though), if they waited for all patches to be done in this case, it may have prolonged the wait by quite a bit longer.
  • Re:Stupidity (Score:5, Insightful)

    by CODiNE ( 27417 ) on Saturday May 13, 2006 @02:52PM (#15325797) Homepage
    You mentioned avoiding null bytes, I seem to recall reading that on PPC that's much harder to pull off because of many RISC ops tend to have a byte of null padding that smaller CISC ops don't need. So besides having to learn a new asm, its also much harder to exploit... PPC did have a real advantage here.
  • by AHumbleOpinion ( 546848 ) on Saturday May 13, 2006 @03:01PM (#15325828) Homepage
    I think you underestimate the importance of assembly language when coding exploits. There are plenty of crackers out there who know x86 ASM. There are *far* fewer who know PPC ASM.

    I think you overestimate the effort required to learn PPC once you know x86. The first assembly language you learn is difficult, especially if it is x86, but for subsequent ones it is far less difficult. After many years of x86 I wrote my first serious PPC code, it beat Apple's MrC compiler quite easily.
  • Re:extortion? (Score:3, Insightful)

    by I'm Don Giovanni ( 598558 ) on Saturday May 13, 2006 @03:13PM (#15325880)
    "That seems like they are expecting an awful lot from Apple "

    Well, Apple *is* advertising their security in their latest ads, so they should have no problems meeting these expectations.
  • by heinousjay ( 683506 ) on Saturday May 13, 2006 @03:14PM (#15325883) Journal
    Perhaps he chose to post AC because anything that goes against groupthink is inevitably modded down? Typically as Troll (Slashdot definition: I disagree with your opinion) or Flamebait (Slashdot definition: I disagree with your opinion)
  • Re:what a ego (Score:5, Insightful)

    by PhrackCreak ( 136718 ) on Saturday May 13, 2006 @03:36PM (#15325965)
    Puh-lease.

    1. Falco5768 is not slashdot.
    2. There are at at least [slashdot.org] a few [slashdot.org] articles [slashdot.org] which are critical of Apple's security policies.
    3. Apple has not actually stifled this person. They patched something. They may have failed to patch other holes. I hope they will work as quickly as possible to patch all exploits they know.
    4. Note that the grandparent post is not yet modded very highly.

    In future posts, please do not clump everyone on slashdot in to one unified entity.
    In future posts, only include actual facts instead of implied conjecture into actions that have not occurred.
  • So 100,000 birds in the hand are worth 20 in the bush?

    I mean, note the word "potential". There are thousands of vulnerabilities that have been exploited on Windows, and like 20 potential on Macs, and that's equal? The day you'll trade me 100,000 dollars for a chance at 20 bucks is the day I'll toss my Apple in the trash.
  • Grow up kids! (Score:5, Insightful)

    by Deorus ( 811828 ) on Saturday May 13, 2006 @03:42PM (#15325999)
    > Its one thing to find holes and tell Apple and people you did, and send the info to Apple. But I am so sick of these people who feel that if said company doesnt respond NOW they are then in the right to exploit said holes and make everyones life misserable.

    What do you mean? That he doesn't have the right to disclose what he found? Does his constitutional rights make you sick? Well then I think that YOU are the one with a problem. You should be thanking him for warning Apple. I know many who would have kept it secret and written all kinds of worms just to make fun of fanboys like you, and I guess that's what you're really asking for with your complaints.

    Here goes my karma... ;-)
  • by a_greer2005 ( 863926 ) on Saturday May 13, 2006 @04:12PM (#15326149)
    I hear, every nonth or so, now a days that "OSX is as volnerable as Windows" yet I have yet to see one attack in the real world that doesnt requier utter user stupidity (hint -- a web-app should never need your root/"admin" password)

    Please someone, give me a web address that will install spy/crudware without my consent automaticly, show me how, with no user intervention, an unpatched box can be hacked to hell by spamers to use in botnets in under 2 minutes...show me this or shut the fuck up!

    I understand that OSX isnt perfectly secure, it has its bugs, so does BSD as a whole, but the holes get FIXED and not denied for months untill the hole is used to destry hundreds of thousands of PCs.

  • Re:Stupidity (Score:3, Insightful)

    by Jared Lundell ( 874807 ) on Saturday May 13, 2006 @04:17PM (#15326175)
    Buffer overflows are a software problem and have nothing to do with the CPU. The PowerPC would have been just as vulnerable, when running identical code.

    That's not entirely true. Buffer overflows are exploited at the assembly level, not at the source code level. So the point is that, even if a PPC is running the same source code, it's not running the same assembly, since it uses a different ISA.

    More to the point, the simplest and most common buffer overflow attacks rely on the fact that the user stack traditionally grows down. Since buffers are addressed upwards, writing of the end of a buffer can overwrite a previous stack frame and return address. If the user stack were to grow upwards instead, this wouldn't be nearly the problem it is, since writing past the end of a buffer would result in corruption of other user variables or some unused memory, instead of changing the return address of a function.

    Even though stacks growing down is really just a convention which could be changed by the compiler, the x86 instruction set supports and almost enforces that convention. The x86 push and pop instructions that are used to handle stack frames expect that the stack grows down and wouldn't work for a stack growing upward. I don't know PPC assembly, so I can't say if it does the same thing.

    Put simply, it is possible to create and instruction set architecture that is less vulnerable to buffer overflows than x86 is. Whether PPC is that ISA, I don't know, but it would be possible to create one.
  • Re:Relativity (Score:3, Insightful)

    by BasilBrush ( 643681 ) on Saturday May 13, 2006 @04:32PM (#15326238)
    15 years? Child. Yes in all probability you have been "hacked, rooted, afflicted with spyware, or even infected by a single virus". You just haven't noticed.
  • Re:Relativity (Score:5, Insightful)

    by Wordsmith ( 183749 ) on Saturday May 13, 2006 @04:45PM (#15326288) Homepage
    It most certainly is possible. I won't go as far as the grandparent, but close. I've never been -harmfully- afflicted by being hacked, rooted, or infected with a virus or spyware. I've almost never run into any of those at all - but once every couple of years something crops up.

    I've (very) occasionally caught a virus present on the machine before it was ever executed or did any harm. I've (very) rarely wound up with spyware - but nothing major, and nothing that couldn't either be uninstalled via its own well-behaved uninstaller or removed easily via something like adaware.

    Why? Because I don't run or install software if common sense says the source might be shady. The one or two spyware incidents I've had were with semi-legit software - it probably told me in a Eula all about the nasty reporting it wanted to do, and I clicked through - that, as spyware goes, was relatively benign.

    Now my old roommate's machine, with the same basic setup, was another story. It was amazing she could move the mouse with all the crap going on in the background from various malware. Different computing use habits, I suppose.
  • by NutscrapeSucks ( 446616 ) on Saturday May 13, 2006 @04:54PM (#15326320)
    I'm trying to figure out your point in the relationship to the story and why it's insightful.

    Are you arguing that it's "enough" for Apple to not patch known problems? That because Apple has a good track record that they can be lax? That Apple should imitate Microsoft's policies of the late 1990s and not take "gray hats" seriously?

    If so, that's a pretty stupid and reactionary attitude. I think most Mac users, including myself, are not slobbering "macz rulez" and want Apple to take an aggressive stance towards security issues in order to prevent the Windowns situation from ever happening.

    Hey, some of us remember the days when Windows NT 4.0 was considered relatively immune to hackers when compared to *nix systems. Things can change if the vendor is idiotic.
  • Re:Stupidity (Score:3, Insightful)

    by dfghjk ( 711126 ) on Saturday May 13, 2006 @04:56PM (#15326329)
    no. the whole point of risc is an instruction set that's easier to execute. that includes uniform size but not necessarily smaller.
  • Re:Stupidity (Score:2, Insightful)

    by strstrep ( 879828 ) on Saturday May 13, 2006 @04:58PM (#15326345)
    Right. On a CISC machine, an opcode could require anything from (as an example) 1-18 bytes to encode. On a RISC machine, everything would be a certain length, say 4 bytes. Now if the specified instruction (noop for example) only requires one byte, then the rest of the opcode would be insignificant.
  • Re:Stupidity (Score:3, Insightful)

    by bealzabobs_youruncle ( 971430 ) on Saturday May 13, 2006 @05:15PM (#15326399)
    "Also don't forget: most hackers have self-assembled Intel/AMD machines... that certainly counts."

    I've built literally hundreds of PCs for myself, friends, family, co-workers and clients. I couldn't craft an exploit if you paid me too.

  • Re:extortion? (Score:3, Insightful)

    by NightHwk1 ( 172799 ) <jon.emptyflask@net> on Saturday May 13, 2006 @07:27PM (#15326930) Homepage
    Oh, come on. Even the mighty OpenBSD has had vulnerabilities. It's a little unrealistic to expect every piece of software (or even just the stuff distributed with an OS) to be perfectly secure and bug-free.

    Or maybe having an open-source license excuses them from your standards?

    Plus, posting exploit information before sending a nice email to the developer is just irresponsible. How would that benefit anyone other than script kiddies?
  • by Anonymous Coward on Saturday May 13, 2006 @07:37PM (#15326978)
    like the gp said, examples please? show me a site that installs malware by browsing. it's easy to say "there you go, there's an attack right there" but if thats the case why isnt it being exploited? there are plenty of people running out of date macs yet still no increase in OS X malware.

    heck, show me osx malware at all (besides norton antivirus), even something i'd have to be an idiot and run myself. and not that proof of concept virus with no payload, something that actually does something negative. seems to me everyone likes speculating about how bad osx security is since patch X came out, but for whatever reason the hackers never bother exploiting it.
  • Re:Relativity (Score:3, Insightful)

    by steeviant ( 677315 ) on Saturday May 13, 2006 @08:17PM (#15327142)
    Uh huh, so lets phrase that a different way... you mention that you caught viruses on the machine before they could execute. Unless you manually check all the instructions before they reach the CPU then this indicates pretty clearly you'd be running virus checking software. You also mention the need to use adaware from time to time.

    So to get this straight, you run an operating system that has so many security problems that you need to run at least two other programs just to make sure that you aren't infected by anything. At least one of those programs is an intensive application that has to scan every potentially harmful file before it can be used.

    Despite having effectively ended up with a less powerful computer with less memory, and still having to very carefully modify your behaviour while using your computer because of the OS vendors poor security practices you're still defending their operating system (and effectively their reputation). Bizarre.

    And people say Apple and Linux fans are zealots.
  • by angst_ridden_hipster ( 23104 ) on Saturday May 13, 2006 @08:26PM (#15327182) Homepage Journal
    I agree that people repeat that "security by obscurity doesn't work" without really understanding the concept. I mean, what is a password but an obscured piece of information? Still, the origin of the phrase is attacking the idea that an obscured algorithm will protect you; you have to assume that an attacker will capture one of your en/de-cryption devices, and learn the algorithm.

    That being said, I disagree with your assertion that 20 dictionary attacks a day is 20 times more likely to get into an SSH server than 0 dictionary attacks. If your passwords are any good, they won't get in either way.

    Yes, your "obscure" port protects you from the dumber automated scripts. That could buy you a little time if a genuine vulnerability shows up in the sshd. But it's only a matter of time before the stupid scripts scan for sshd on other ports.

    Then you'll have to switch to port knocking ;)
  • by angst_ridden_hipster ( 23104 ) on Sunday May 14, 2006 @12:19AM (#15328019) Homepage Journal
    Heh, we have yet to encounter even a port scan on our obscure SSH port, let alone any kind of attack, so it's safe to say that script kiddies don't want to spend the time scanning all 65,000 ports on every computer when they can get a similar yield by only harvesting those computers that answer on port 22.

    True, especially since it's easier to defend against broad, repeated scans (assuming they don't have a good way of doing it from distributed hosts).

    Still, I'd argue your defense isn't as much one of obscurity as it is one of heterogeneity. If everyone ran sshd on a different port, the attack vectors would be different.

    t's also probably safe to assume that if someone has the intelligence to change the port that SSH is listening on that they are also clever enough to keep it up to date and securely configured.

    I wasn't suggesting that you weren't keeping your sshd up to date. I was thinking more along the lines of a 0-day exploit kind of situation. The first attack scripts will go for the easy targets.

    Which kind of brings me full circle. Obscurity, in this case, is more a means to heterogeneity. One powerful way of being secure is just being a little more difficult a target than the next guy. Burglars will go to the house without a dog (or without an alarm system). Sure, a determined burglar will still be able to get into a protected house, but why bother? As the marketing folks say, they'll go for the low hanging fruit.

    That is, unless the fruit you're protecting is really, really juicy.

    OK, I've mangled enough metaphors to traumatize an entire English Department, so I'd best stop here.

    Unfortunately the soft pink human underbelly of your network is the most glaring weak point for attackers targetting your systems, and we can't really firewall their voice-boxes and fingers if we expect to keep doing business.

    I often think security would be so easy if we just didn't have those darn users...
  • by ejtttje ( 673126 ) on Sunday May 14, 2006 @01:46PM (#15330118) Homepage
    I think it's also important to keep in mind whether people are talking about "theoretical" security, or "practical" security. Theorists are concerned with being impenitrable by nature, with as few secrets on your part as possible -- the assumption being that the spread of information is inevitable. In this view, obscurity is only a short-term, O(1), solution.

    Of course, we all know there's a big difference between theory and practice... I agree that obscurity is a valuable tool in the arsenal, but it's only a bandaid compared to the theory side of things... obscurity may protect you against the common script kiddie nuisance, but you need theory to protect you against the professional cracker, which is the real danger to whatever you're trying to protect.

    From that perspective, one could argue it's better to let the script kiddies bang on your system to ensure it's secure. If they do get through, the worst you get is a spambot or some other relatively obvious, but minor, mess to clean up, and you know you've got a hole to fix. But if you left that unknown hole sitting around, when the real cracker comes, he's going after your corporate business plans and new prototypes, and he's probably not going to be as obvious about it... which leaves you in for a surprise when your competitors beat you to market with a cheap copy of what you've been working on, costing you far more than the script kiddie cleanup ever would. Just a thought.

8 Catfish = 1 Octo-puss

Working...