ZeroDay

Latest

  • Apple releases slew of updates, fixes Zero Day bug

    by 
    Michael Grothaus
    Michael Grothaus
    04.14.2010

    Apple has released a slew of updates in the last few days, including a security update that fixes the Zero Day bugs discovered by Charlie Miller and revealed at CanSecWest. In addition to the MacBook Pro and MobileMe Backup updates, Apple has also released: 27-inch iMac SMC Firmware Update 1.0 This update fixes Target Display Mode compatibility issues on 27-inch iMac computers. Weighs in at 397 KB. 27-inch iMac EFI FW Update 1.0 The update is recommended for all quad-core Intel Core i5 and Core i7 processor 27-inch iMacs. This update addresses the following: Resolves an issue that sometimes caused high processor utilization while playing audio through the headphone output mini-jack. Resolves an issue that prevented the display backlight from turning on after powering on the iMac. Weighs in at 2.1 MB. Security Update 2010-003 (Snow Leopard) Security Update 2010-003 is recommended for all users and improves the security of Mac OS X. Weighs in at 6.50 MB. Server Admin Tools 10.6.3 This update includes the latest releases of: iCal Server Utility, Podcast Composer, Server Admin, Server Monitor, Server Preferences, System Image Utility, Workgroup Manager, and Xgrid Admin. The update weighs in at 236MB. Security Update 2010-003 (Leopard-Client) This update improves the security of Mac OS X. Weighs in at 218.6 MB. Security Update 2010-003 (Leopard-Server) This update improves the security of Mac OS X. Weighs in at 379.5 MB. Mac OS X v10.6.3 v1.1 Update (Combo) The 10.6.3 v1.1 Update is recommended for all users running Mac OS X Snow Leopard and includes general operating system fixes that enhance the stability, compatibility, and security of your Mac. The update weighs in at 785.29 MB. Mac OS X Server 10.6.3 v1.1 Update (Combo) The 10.6.3 v1.1 update is recommended for all servers currently running Snow Leopard Server version 10.6 and includes general operating system fixes that enhance the stability, compatibility and security of your server. The update weighs in at 897.32 MB.

  • 20 zero-day security holes in Mac OS X to be revealed

    by 
    Michael Grothaus
    Michael Grothaus
    03.20.2010

    Charles Miller, a computer security researcher who's worked with the NSA, is planning to reveal 20 zero-day security holes in Mac OS X at CanSecWest, a digital security conference, in Vancouver BC next week. A zero-day security hole is a weakness in software that neither the makers of the software nor other individuals have any knowledge of. Hackers then take advantage of the exploit on the day it becomes general knowledge. Miller revealing that Mac OS X has twenty of them makes Apple look like they didn't do the job right the first time and also suggests Apple needs glasses to see what they've missed – and he's not wrong. "Mac OS X is like living in a farmhouse in the country with no locks, and Windows is living in a house with bars on the windows in the bad part of town," Miller said, suggesting that while both OSes have their security flaws, the Mac OS is safer because of the lack of people threatening to exploit it. But software is software, and no matter how much more secure Mac OS X is than Windows, it's still bound to have some security issues. I'm all for Charles Miller digging around the OS to find flaws, but come on, if you find them, why announce them to the world and open up a potential new round of attacks? Wouldn't it be better to report them to Apple instead of to the host of hackers that pay attention to CanSecWest? There's no question about it, Apple should have caught these holes in the first place and Miller is right in calling them out on it. But while I understand that public outings go a long way to ensuring that people or companies don't make the same mistakes again, you can call Apple out without showing people – especially the wrong people – the specific cracks in the system.

  • Charlie Miller to reveal 20 zero day security holes in Mac OS X

    by 
    Darren Murph
    Darren Murph
    03.19.2010

    Say, Charles -- it's been awhile! But we're pleased as punch to see that you're back to your old ways, poking around within OS X's mainframe just looking for ways to remotely control the system, snag credit card data and download a few interoffice love letters that are carefully stashed 15 folders down within 'Documents.' The famed Apple security expert is planning yet another slam on OS X at CanSecWest, where he'll reveal no fewer than 20 zero day security holes within OS X. According to Miller, "OS X has a large attack surface consisting of open source components, closed source third-party components and closed source Apple components; bugs in any of these types of components can lead to remote compromise." He also goes on to reemphasize something he's been screaming for years: "Mac OS X is like living in a farmhouse in the country with no locks, and Windows is living in a house with bars on the windows in the bad part of town." In other words, Apple users are "safer" (due to the lack of work that goes into hacking them), "but less secure." So, is this a weird way of applying for a security job in Cupertino, or what?

  • Zero-day exploit for QuickTime in the wild

    by 
    Robert Palmer
    Robert Palmer
    09.18.2008

    A hacker who found a vulnerability in QuickTime said he posted the attack code online after Apple ignored him for a month. The code exploits a flaw in QuickTime that causes a crash when a unusually-long parameter is passed along with a movie file. While it's not demonstrated, the hacker claims that "code execution may be possible." With Leopard, address space randomization makes it more difficult to execute code in memory spaces left after a crash. Earlier operating systems (like Tiger and Panther) may still be vulnerable. Apple hasn't released any guidelines to avoid the problem, as it does in high-risk cases. Intego, in a press release, considered the risk "low" and will be updating its VirusBarrier X5 software if someone creates malicious software based on the attack technique. Even though the risk may be low, an abundance of caution is always advised. Be careful when opening (or clicking links to) QuickTime files from sources unknown to you. In the past, phishing/malware attacks have been delivered as fake QuickTime or Windows Media codecs, so remember that any executable file you download from an unfamiliar source may be suspect. [Via InformationWeek and IDG.]