OS X Bug Exploited To Infect Macs Without Need For Password 127
An anonymous reader writes: A new flaw has been discovered in the latest version of OS X which allows hackers to install malware and adware onto a Mac without the need for any system passwords, researchers say. The serious zero-day vulnerability was first identified last week and results from a modified error-logging feature in OS X Yosemite which hackers are able to exploit to create files with root privileges. The flaw is currently found in the 'fully patched' OS X 10.10.4, but is not in the newest 10.11 El Capitan beta – suggesting that Apple developers were aware of the issue and are testing a fix.
Also fixed in 10.10.5 (Score:4, Informative)
It's also already fixed in the latest 10.10.5 beta.
Re: (Score:3, Funny)
But Windows 10 is free and people already happily flock to free adware infested services like Facebook, Gmail, etc. So Microsoft just took the normal adware-filled web browsing user experience and transported it to the desktop to make using computers more consistent!
Anyway, with the way Apple's stock is going it's just a matter of time before the same thing in OSX. Except Apple won't give any options to disable it.
Re: (Score:2, Informative)
But in a year, you'll have to pay for it
It's free for life for all devices that already own Windows 7 or 8 and install it within the year. This is information right off their website. The cost to purchase after that is fairly nominal.
all that adware and spyware will still be present and enabled by default,
What malware? Please point me to concrete evidence of this as I have yet to see it.
"What Malware?" (Score:4, Informative)
all that adware and spyware will still be present and enabled by default,
What malware? Please point me to concrete evidence of this as I have yet to see it.
I believe that's a reference to what they disable that used to work, and the bandwidth stealing.
The things that get ripped out from under you are:
(1) Windows Media Center
(2) DVD Playback
(3) Desktop gadgets
(4) Preinstalled games (Solitaire, Minesweeper, Hearts; you have to purchase replacements)
(5) USB Floppy drive support
(6) The OneDrive application from Windows Essentials (it's replaced instead with the sync application)
(7) Windows Updates are forced on you instead of being optional, unless you pay more for Pro or Enterprise
We've seen this already with the consistent installation of the Windows 10 Update tray icon and application, even on Windows 7 and 8. This is particularly insidious, since the application runs in the background, and acts as a torrent style replication server as part of their Windows 10 content delivery network used for the updates. Basically, they are stealing bandwidth from you, even if you do not opt in for the update.
Microsoft calls this "feature" Windows Update Delivery Optimization, and your computer is basically eating into your bandwidth cap, if you have on, since about July 29th when the update was released. This is enabled by default for the Home and Pro versions (but not Enterprise or Education, apart from the local network).
To disable it, you have to go to the "Settings" / "Update & Security" / "Windows Update" / "Advanced Options" / "CHOOSE HOW UPDATES ARE DELIVERED", and then turn the "Updated from More than One Place" from "on" to "Off".
And yeah, I think if something is eating into my bandwidth cap, it counts as "malware". The other problem is that it tends to monopolize upload bandwidth, which is usually asymmetric with download -- mean that it eats all of your ability to ACK your full download bandwidth.
The other thing that I'd count as "malware" is Wi-Fi Sense, which shares your Wi-Fi password with various email and social network contacts. But it doesn't allow you to pick and choose with which ones it's shared, so for every enabled network, it's "everyone on this social network in my contacts, not just family or close friends".... also: kinda not cool.
Again: trun-offable, but on by default: "Windows Settings" / "Network & Internet" / "Change Wi-Fi settings" /"Manage Wi-Fi settings" then turn off all the items under Wi-Fi Sense. Then have Wi-Fi Sense (and JUST THAT) "forget the list of known networks".
Re: (Score:3)
The things that get ripped out from under you are:
(1) Windows Media Center
(2) DVD Playback
(3) Desktop gadgets
(4) Preinstalled games (Solitaire, Minesweeper, Hearts; you have to purchase replacements)
(5) USB Floppy drive support
(6) The OneDrive application from Windows Essentials (it's replaced instead with the sync application)
(7) Windows Updates are forced on you instead of being optional, unless you pay more for Pro or Enterprise
1) The installer notifies you that you will lose that feature if you currently have it enabled. So no issue there. Note the feature wasn't popular so that's why MS made away with it.
2) DVD Playback. Performing updates will install Windows DVD Player at no charge (limited time) which will provide DVD playback
3) It was a shitty feature that reeked security holes. MS decided it wasn't a popular enough feature to keep it. So as far as I'm concerned it was a good decision
4) Big deal. There's tones of better offe
Re: (Score:1)
I wish people would stop saying that Windows 10 is free!
Point me to a Windows 10 ISO (that's easy) that won't ask for any registration key when I'm installing it (doesn't exists)
Re: (Score:2)
Go ahead and redefine free as an ISO provided if you wish but for the rest of the world FREE means I get it at no charge.
Re:Also fixed in 10.10.5 (Score:4, Insightful)
But Windows 10 is free
I know you were trying to be humorous; but OS X has been Free for the past 3 Revisions now.
Re: Also fixed in 10.10.5 (Score:2, Informative)
I just installed Win10 via upgrade and rather easily turned off almost all the reporting features within minutes from the control panel. I don't use their store and I login only with a local login and use Firefox. Win10 so far has been as good as Win7 and I haven't run into any of Win8 issues. You sound like another Microsoft bandwagon hater. Years ago I learned to use the best tool for job, maybe you should too.
Re: Also fixed in 10.10.5 (Score:5, Informative)
I just installed Win10 via upgrade and rather easily turned off almost all the reporting features within minutes from the control panel.
You could have turned off the reporting from the installer by selecting the custom configuration option.
Re: (Score:1)
turned off almost all the reporting features
But not all and you can't prevent MS from changing your shit with forced updates. Or are you using Enterprise?
Re: (Score:2, Troll)
turned off almost all the reporting features
But not all and you can't prevent MS from changing your shit with forced updates. Or are you using Enterprise?
Yes all. And you cannot prevent Apple from changing your shit when they update OS X. What makes you think that MS will use Windows Update to change settings? They have never done so before, and have not indicated that they reserve that right for the future.
Re: (Score:1)
So you are using Enterprise. It's impossible to disable all of the spyware in Windows 10 Home and Pro.
Re: (Score:1)
You cannot disable device data reporting, search box keylogging, Microsoft advertising ID creation and reporting, Windows Defender or automatic updates in Home or Pro. Even if you do disable everything else, Microsoft can turn it all back on and/or add additional spyware with silent, forced updates.
Re: (Score:3)
And you cannot prevent Apple from changing your shit when they update OS X.
Turn in your geek card, because yes you can modify OSX post-patch - you just have to be comfortable with a *nix command prompt and have sudo privs.
Re: Also fixed in 10.10.5 (Score:4, Informative)
What makes you think that MS will use Windows Update to change settings?
Because they've done it before [zdnet.com].
Re: (Score:1)
It's not "Spyware", it's "protective observation". Surely you can't have any problem with Nanny Microsoft watching your back against these evil luddites and EFF maniacs. Plus if you take too many pills they can help you out with a phone call to the FDA for "your own good". OK we don't know if they would, but they certainly *could*. Doesn't that just make you feel ever so *safe* ? And the Adware? naw, it's essential information dispensation, to stimulate the economy. Don't ou want to do YOUR part? Or aren't
Re: (Score:3)
That's a pity. This exploit could be used to automatically deinstall Apple's app store, install an open one and replace XCode with some free, cross-platform development environments. It would be a win-win for Apple and everyone else.
Apple uses the App Store platform to roll-out Software Updates; so you might want to think twice about that.
And as far as XCode goes, Apple hasn't automatically installed XCode for about a decade. Do try to keep up!
Re: (Score:2)
"It's also already fixed in the latest 10.10.5 beta."
Good. Now can we work in the iOS bug that allows malicious ads to yank you into the App Store involuntarily?
Re: (Score:2)
"It's also already fixed in the latest 10.10.5 beta."
Good. Now can we work in the iOS bug that allows malicious ads to yank you into the App Store involuntarily?
Has it been fixed on Android already? Oh no, wait, that takes you to Google Play involuntarily - so not a bug, but a feature, right?
Re: (Score:1)
An acknowledgement of iOS/Android equivalence. I'm glad I switched to a Windows phone, I guess...
Re: (Score:2)
An acknowledgement of iOS/Android equivalence. I'm glad I switched to a Windows phone, I guess...
Well, then you switched less than 7 months ago, because there were reports of it happening there too. Which went mostly unnoticed because pretty much nobody was affected - well only all Windows Phone users.
Re: (Score:1)
What is cute is all this effort to deflect from the problem with OS X. And you all are falling for it. Silly users...
Re: (Score:2)
It'd be easier to just do this:
#sudo chflags uchg /etc/sudoers
(chflags is the OSX equivalent of chattr. "uchg" is the equivalent of "+i" "nouchg" is "-i")
Click-bait FUD (Score:1)
NotMisleading title.
Old news.
Patched bug.
Not good (Score:2)
Seems like Apple made some really big mistakes in Yosemite. Let's hope they fix it asap.
Better Title (Score:2, Insightful)
"Significant vulnerability demonstrated in OS X. Apple releases patch a few days later. News at 11."
Not as exciting, is it ?
(it appears to be dealt with in both the 10.10.5 and 10.11 betas)
Re:Better Title (Score:5, Insightful)
apple knows of bug. fixes it in beta(first anyways, dunno if it's fixed in non beta). journalist tells it's fixed in the latest version.
story gets posted again after a week on slashdot.
but osx being exploitable if you have console/local access? that's not really news.
Re: (Score:3)
but osx being exploitable if you have console/local access? that's not really news.
I don't know why so many people don't get this.
The bug doesn't require a human at the console. Any code-execution bug can be escalated to root access because of this bug. It is not, by itself, a remote root, but security vulnerabilities can be combined, and a combination of bugs typically rates at the highest threat level of any individual element of the combined attack.
That is, imagine that you have a bug in your browser that causes it to automatically open PDF files in an external viewer. This rates as
Re: (Score:1)
Not so easy to be smug, is it?
For an apple user? of course it is.
You mean this one? (Score:4, Informative)
Re: (Score:2)
"An empty word doc sized exploit"
FTFY
Re: (Score:2)
this is an actual implementation of that vulnerability.
Re: (Score:2)
Re: (Score:2)
Better link (Score:5, Informative)
It's a privilege escalation exploit, so an attacker would already need shell access on your computer to get something done. Every OS has privilege escalation vulnerabilities, because it's much harder to close all the holes when you allow someone to execute arbitrary code on a system.
That said, this is a particularly braindead bug from Apple, and it is worrisome because it shows they aren't thinking about security, or don't have proper processes in place to ensure the system stays secure. Their programmers should have known better than to create that kind of environment variable so lightly.
Re:Better link (Score:5, Informative)
Ugh, don't give this asshole more traffic. I think there's a reason few people are linking to his blog directly. He released the details of this bug without even attempting to contact Apple. When asked why he didn't do so, he replied "Why should I?" Later he states that "Responsible disclosure is simply a way of redirecting blame for a vulnerability from the vendor to the reporter." Right on his blog he's advertising his own presentations. Essentially, he's making news about this at the expense of user safety in order to promote himself and his services.
A real piece of work.
Re:Better link (Score:4, Informative)
This vulnerability is already being exploited in the wild. In that case, responsible disclosure means announcing it publicly, so people can defend themselves. And if Apple gave him as much trouble as they gave me, I don't blame him for not reporting the bug to them.
Re:Better link (Score:5, Insightful)
Is it really too much work for a security researcher to send an e-mail to product-security@apple.com? About five seconds of searching got me Apple's support page and that e-mail address.
This guy admittedly didn't even try. And bugs that affect functionality are an entirely different matter than serious security issues. When dealing with a zero day, the decision on whether to announce it publicly depends on a number of factors.
The very act of announcing it publicly guarantees that new exploits will explode in the wild (as this article confirms). And the reality is that very few OS X users will have seen this idiot's initial posting a month ago. Did you? I sure didn't. In the meantime, my system was and is now vulnerable to a hell of a lot more malware than it otherwise would have been.
Sorry, but I have to disagree with you. Bad on Apple for making a stupid mistake in the first place and being slow to fix it, but I'm not giving this guy a pass either.
Re: (Score:2)
That said, Apple's bug process sucks, and letting people know about security bugs is a good thing, too.
Re: (Score:2, Interesting)
He also provides a fix, so you don't have to wait on Apple while your machines are vulnerable.
Yeah, installing a binary-only fix from a security researcher who says "Responsible disclosure is for pussies" - what could go wrong.
Re: (Score:1)
I am *not* an Apple guy but it has Unix at its core. Can't you just chmod the file and be done with it? I have no idea what the commands should be but it seems likely there's a way to set it to read only even beyond root so that root would have to chown it before it can set the privileges to writable and actually do anything?
Maybe I am missing the exploit but that is what I got from it. A patch should not even be needed, really. It would be nice but it seems something easy enough to fix for the time being.
It is not big deal, Chicken Little... (Score:3)
Ugh, don't give this asshole more traffic. I think there's a reason few people are linking to his blog directly. He released the details of this bug without even attempting to contact Apple.
It is not big deal, Chicken Little...
If you looked at his LinkedIn profile -- assuming you have access because you are a close enough contact -- Stefan Esser is a first degree contact with Aaron Sigel, who is the Manager in OS Security at Apple. He's also a first degree contact with Alex Ionescu, who used to work on iPhone until 2011 (the same year I left Apple), and of course, I know Stefan through various forums, and from my tenure on the Core OS Kernel team at Apple (I was there 8 years).
So yes, Apple h
Re: (Score:2)
That said, this is a particularly braindead bug from Apple, and it is worrisome because it shows they aren't thinking about security, or don't have proper processes in place to ensure the system stays secure. Their programmers should have known better than to create that kind of environment variable so lightly.
They are thinking about security. This entire class of exploit is impossible on iOS and will be impossible in the next release of OS X (where it's much harder if you want to be compatible with typical UNIX software).
Re: (Score:2)
This entire class of exploit is impossible on iOS and will be impossible in the next release of OS X
How will this 'class' of exploit be impossible on the next version of OSX (and how is it impossible now)? All you need to do is find a bug in an approved program (like Safari, and there are bugs in Safari), then use this exploit to get root permissions.
They are thinking about security.
This bug is clear evidence they don't have proper processes in place to give them security.
Re: (Score:3, Insightful)
It's a privilege escalation exploit, so an attacker would already need shell access on your computer to get something done.
No shell access needed. A code execution bug in Firefox, Safari or Chrome (or whatever browser or internet-facing software you use) and the attacker is a local user. Especially Firefox does not have a sandbox, so a bug gives the attacker free reign. With this bug he can become root on your kit. That is bad. Blended attacks are the *norm* now - not the exception. Sometimes they are called "attack coctails" when they try multiple vulnerabilities to get foothold and then use privilege escalation bugs like thes
Re: (Score:2, Insightful)
Re: (Score:2)
NO, Code execution in a browser CANNOT escalate privileges.... none of those applications have sufficient rights to change the /etc/sudoer file
Way to miss the point. If they had the rights to write to /etc/sudoers then they wouldn't need a privilege escalation vulnerability. The entire point of this exploit is that it allows someone with an unprivileged account to gain root access. That said, both Chrome and Safari run the WebKit renderers in sandboxes that don't have the ability to run any setuid binaries (which this needs), so the grandparent is only partially correct: only Firefox would be vulnerable, out of the ones that he listed.
Re:Better link (Score:5, Insightful)
"On Monday, researchers from anti-malware firm Malwarebytes said a new malicious installer is exploiting the vulnerability to surreptitiously infect Macs with several types of adware including VSearch, a variant of the Genieo package, and the MacKeeper junkware. Malwarebytes researcher Adam Thomas stumbled on the exploit after finding the installer modified the sudoers configuration file."
The installer itself has been granted privileges by the operator to install the application to all users. It cannot install itself directly from the browser. It has to be downloaded (and potentially auto-opened) for installation. It either has to be installed maliciously into an application (which is unlikely to be a signed developer).
Subsequent to that installation of the malicious malware, that user that installed the application has been given effective root access WITHOUT requiring passwords on subsequent actions. But until that file is modified, that user does not have sufficient rights, nor do any 3rd party applications have sufficient rights to make changes to that file without user intervention.
The vulnerability is that the installer can make changes to the
It is highly unlikely an application that is from a certified/signed developer is going to contain malware in the installer -- possible but not likely. This means social engineering to get the user to download unsigned applications - then go into security settings and allow that installer an exception to start the installation.
http://arstechnica.co.uk/secur... [arstechnica.co.uk]
Read the code that is being executed by the installer
Re:Better link (Score:4, Insightful)
Re:Better link (Score:5, Insightful)
NO, you miss the point....
You need to learn to distinguish between vulnerabilities and exploits. An *exploit* (the "installer" in this case) takes advantage of a *vulnerability* (the privilege escalation bug) to perform the attack. The underlying vulnerability exists regardless of the exploit.
You focus on the exploit and (incorrectly) claim that it is unlikely to work. That's beside the point, however, as there are many *other* ways to exploit the vulnerability, where a code execution vulnerability in a browser, email client, facebook app or whatever can be combined with this vulnerability to create true drive-by exploits.
I took issue with the dismissal of this bug as "just a privilege escalation" bug. Privilege escalation bugs are *serious* and critical vulnerabilities.
You do not need an installer to exploit this vulnerability. A simple execution bug in Firefox (last version patched 4 of them, as did practically every version before that) or a sandbox escape bug in Chrome/Safari (more rare) will get you pwned should an attacker choose to create an exploit.
As an apologist you are looking for a way to explain away the seriousness of the bug. That's the wrong (and dangerous) way to think about it. There are many attackers with tons of creativity who are ready to leverage a privilege escalation bug in any way they can.
You cannot possibly cover all those scenarios. That is why we need OS vendors and software developers to maintain and respect security boundaries: Walls where as few as possible well-defined gateways, where each gateway is controlled by transparent policies that makes it easy to audit what can pass through the gateway and (preferably) why.
In this case a piece of the wall crumbled, which means that you must now consider the risk that all the bad guys on the outside can venture in to the protected inside and do whatever they like. You have identified one bad guy on the outside (the installer) and claim that he can be controlled. What about all those that you have not identified?
Re: (Score:2)
No, no, no...
The bug has only been observed in the wild in an installer, but that doesn't mean it can only be exploited by an installer.
If you read the proof-of-concept in the OP link, no installer was involved at all.
More generally, I don't understand why you seem to think a non-privileged (i.e. not running as root) installer process could exploit this bug in a way that a browser process cannot.
Remember, we are discussing the hypothetical scenario of your browser already executing attacker-controlled co
Re: (Score:3)
You might want to read up on what "privilege escalation" means...
none of those applications have sufficient rights to change the /etc/sudoer file
None of these applications should be able to change sudoers, but due to this bug all of them are actually able to. That is why it is called privilege escalation.
Most unix admins don't allow anyone root access
That is exactly why this is a vulnerability. If the users already have root access, there will be no privilege escalation and this wouldn't be a vulnerability at all...
Re: (Score:2)
No shell access needed.
Well, you do need the ability to set an environment variable, fork and exec a setuid binary. But you don't need to run /bin/sh.
Privlege escalation exploit change looks like this (Score:5, Informative)
# User privilege specification
root ALL=(ALL) ALL
%admin ALL=(ALL) ALL
If it has been changed to include a new user or make changes at the end of any of the lines to add "NOPASSWD:ALL" then you have been affected:
eg.
username ALL=(ALL) NOPASSWD:ALL
Re: (Score:2)
Re: (Score:2)
The installer itself has been granted privileges by the operator to install the application to all users. It cannot i
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
Modifying the sudoers file was only one example use for this. It allows you to write to any file that is normally only writeable to root. Modifying sudoers is a fairly simple and visible change, but modifying one of the system startup scripts that launchd runs as root would work just as well. I think it only lets you append to a file, but it would also be possible to temporarily modify sudoers, then set your worm's setuid bit and change the owner to root, then revert the sudoers change. The only user-visible thing would be the setuid bit on a suspicious binary hidden somewhere in the system (how many people check for this?). Of course, once you are root then you can do things like modify firmware and boot settings and hide inside the kernel...
Spot on. If I was a bad guy (I'm only a little bad) this is *exactly* how I would create an attack.
The only user-visible thing would be the setuid bit on a suspicious binary hidden somewhere in the system (how many people check for this?)
That part in particular highlights the problem with setuid.
It is, in effect, a deliberate hole in the security boundary: The mere existence of the setuid facility means that you can *never* audit the security policies (access rights) and be confident that they truly reflect the rights and restrictions of users.
Auditor: "Who can access this file"
Admin: "Easy" (ls in the directory), "User1 can write and users in
Infect Mars? (Score:3)
I thought, what? But I misread.
10.11 should be immune anyway (Score:4, Insightful)
but is not in the newest 10.11 El Capitan beta – suggesting that Apple developers were aware of the issue and are testing a fix.
10.11 has a new SELinux-like 'rootless' security model that should mitigate against any privilege escalation attack like this. Odds are it was naturally immune..
Re: (Score:3)
10.11 has a new SELinux-like 'rootless' security model that should mitigate against any privilege escalation attack like this. Odds are it was naturally immune..
That's interesting. This is waht I have been able to find from Apple on the feature (now called "System Integrity Protection"):
"System Integrity Protection
A new security policy that applies to every running process, including privileged code and code that runs out of the sandbox. The policy extends additional protections to components on disk and at run-time, only allowing system binaries to be modified by the system installer and software updates. Code injection and runtime attachments to system binaries a
Re: (Score:2)
So, because someone throws a new cool Apple feature name out there, I should just accept that it is the ultimate security feature that will magically distinguish between malicious and legitimate writes to sudoers?
The description says that it will protect the *binaries*. Reading comprehension? (hint: sudoers is not a binary)
Re: (Score:1)
One of the forums that I frequent had a user who supposedly had a remote execution on a Mac for sale. The price was not unreasonable and I have seen others come and go. I can only assume there are some in the wild. I have seen similar/same for every OS on the planet pretty much - including some of the more obscure stuff. Meh... Practice safe hex. No matter what you do there are risks. To be ignorant of them is folly but, well, some folks tend to think they are immune. I suspect they are already pwned and ju
Re: (Score:2)
To address the actually comprehensible part of your post, it's not true that all OSes are equal in security, or anything else for that matter. We'll have to see how this unfolds.
Re: (Score:1)
What is true is that no OS is secure. Well, not one you can turn on at any rate. Nothing connected is secure. No OS is secure. No code is bug-free. Well, almost no code is bug free. I have a couple of Hello World's that I trust. Some are more secure, OS X is - traditionally - one of the more secure operating systems out there. No, no I am not an Apple fan. I do not even use them. I use Linux, Windows, and sometimes play with Unix. My phones I do not care about - even smart phones. I do nothing on them that