Security Updates, Notices for Mac OS X 74
Myrrh writes "eEye reports they discovered a heap overflow in QuickTime 6.5, which 'allows a remote attacker to reliably overwrite heap memory with user-controlled data and execute arbitrary code.' Now's a swell time to visit Apple and download the updates for both programs." Also, Apple today released Security Update 2004-05-03, which includes updates for AFP Server, CoreFoundation, and IPSec, and is, like the QuickTime 6.5.1 update, available via Software Update.
In fairness, though (Score:5, Funny)
when will karma whores stop (Score:2, Funny)
Re:In fairness, though (Score:5, Funny)
Is it because no one is able to get their ethernet cards to work under BeOS?
Re:In fairness, though (Score:2, Insightful)
Hmm... (Score:5, Funny)
What can I say? (Score:4, Funny)
I guess Macs are just more reliable computers all around...
*ducks*
Re:Hmm... (Score:5, Funny)
Re:Hmm... (Score:1, Interesting)
Guinea Pig? Not Me (Score:2, Funny)
Re:Guinea Pig? Not Me (Score:2)
On the other hand, I know people in Apple, and I know the security updates are given a firm shaking down before they are released into the wild, even the Jaguar updates.
Windows version, not Mac OS. (Score:2, Informative)
The heap overflow vulnerability mentioned here only applies to the Windows version of the Quicktime player, not the Mac OS version.
See here [idefense.com] (section IV), or here [macmegasite.com], or here [cert.org].
Re:Windows version, not Mac OS. (Score:5, Informative)
eeye.com advisory [eeye.com]
It was fixed in a seperate Quicktime update released last friday:
http://www.macsecurity.org/node.php?id=141 [macsecurity.org]
Re:Windows version, not Mac OS. (Score:5, Interesting)
Actually, that's a completely seperate vulnerability. The one talked about here is the one discovered by eEye and not the one discovered by iDefense.
This is not suprising, just 1 month ago I mentioned that quicktime was vulnerable to buffer overflows left and right because there is absolutely no input validation done. I was flamed for saying that, but here we have 3 different buffer overflows patched all at once.
Re:Windows version, not Mac OS. (Score:2, Informative)
Whoops. You're right. Thanks hard-mac and prockcore. Mod grandparent down. ;)
This'll teach me to try and read tech articles in the early hours of the morning...
Who finds these security holes? (Score:5, Interesting)
No matter if it's OS X, Windows, or Linux, there are always these security fixes popping up. I assume there is a QA team that is working on this stuff but unless there is a vulnerability that manifests itself in the form of a virus or hacked system, who finds these things and why were they looking in the first place?
Re:Who finds these security holes? (Score:5, Informative)
Re:Who finds these security holes? (Score:2)
Hackers are people just like everybody else. Nobody is 100% good or evil. We make choices for the same reasons and feelings as everybody else. Have you ever heard of a black hat janitor? Chef? Architect?
Of course not. This black/white hat nonsense objectifies, polarizes and just fuels prejudice towards us. We need people to get to know us as individuals and make up their own minds, not give them a way of pidgeon holing and prejudging us.
Why do we have these security holes? (Score:1)
But why do we still have buffer overflows. Maybe i've got the wrong impression, but i thought that overflows were a trivial issue to fix & equally as simple to avoid. Call me ignorant if you'd like (though a decent non-flaming response would be better) but how super-simple testing isn't standard practice?
I RTFG (RTF Google) [google.com] and the third article down [isoc.org] (watch out, its a pdf) says bounds checking is usually turned off 'in the name of efficiency'. How hard is it fo
Apple email (Score:5, Informative)
AFS server issue is a remote root vulnerability (Score:5, Informative)
@Stake Security Advisory
Advisory Name: AppleFileServer Remote Command Execution
Release Date: 05/03/2004
Application: AppleFileServer
Platform: MacOS X 10.3.3 and below
Severity: A remote attacker can execute arbitrary
commands as root
Authors: Dave G.
Dino Dai Zovi
Vendor Status: Informed, Upgrade Available
CVE Candidate: CAN-2004-0430
Reference: www.atstake.com/research/advisories/2004/a050304-
Overview:
The AppleFileServer provides Apple Filing Protocol (AFP) services for
both Mac OS X and Mac OS X server. AFP is a protocol used to
remotely mount drives, similar to NFS or SMB/CIFS. There is a
pre-authentication, remotely exploitable stack buffer overflow that
allows an attacker to obtain administrative privileges and execute
commands as root.
Details:
The AppleFileServer provides Apple Filing Protocol (AFP) services
for both Mac OS X and Mac OS X server. AFP is a protocol used to
remotely mount drives, similar to NFS or SMB/CIFS. AFP is not
enabled by default. It is enabled through the Sharing Preferences
section by selecting the 'Personal File Sharing' checkbox.
Thereis a pre-authentication remotely exploitable stack buffer
overflow that allows an attacker to obtain administrative
privileges. The overflow occurs when parsing the PathName argument
from LoginExt packet requesting authentication using the Cleartext
Password User Authentication Method (UAM). The PathName argument
is encoded as one-byte specifying the string type, two-bytes
specifying the string length, and finally the string itself. A
string of type AFPName (0x3) that is longer than the length declared
in the packet will overflow the fixed-size stack buffer.
The previously described malformed request results in a trivially
exploitable stack buffer overflow. @stake was able to quickly
develop a proof-of-concept exploit that portably demonstrates this
vulnerability across multiple Mac OS X versions including Mac OS X
10.3.3, 10.3.2, and 10.2.8.
Re:AFS server issue is a remote root vulnerability (Score:2, Insightful)
I'm not calling bullshit, but the air smells kind of funny here...
Re:AFS server issue is a remote root vulnerability (Score:5, Informative)
Make sense?
-weld
Re:AFS server issue is a remote root vulnerability (Score:2, Insightful)
Re:AFS server issue is a remote root vulnerability (Score:3, Informative)
-weld
Re:AFS server issue is a remote root vulnerability (Score:1)
Look in the local NetInfo
Re:AFS server issue is a remote root vulnerability (Score:4, Informative)
Wow, that's a pretty severe vulnerability to make it through Apple's QA processes...
As the previous poster intimates, without an intervening firewall, if you've got AFP turned on (and probably any workgroup of 2 or more Macs would) you're hosed.
A further issue with this is that the inbuilt GUI firewall front-end provided by Apple is brain-dead in that it doesn't allow you to configure per interface rules. This means that if you want a dual-homed Mac acting as a gateway to share files on its internal interface, the external interface is left vulnerable.
The actual firewall backend - ipfw, inbuilt and inherited from FreeBSD - is sufficiently sophisticated to enable per interface rules, but to access this functionality you need to completely disable the GUI firewall front-end and configure ipfw yourself using the command line.
It's been this way since Jaguar (10.2) and I sincerely hope that Apple fix this in 10.4 otherwise - with vulnerabilities like this - its reputation for security over its Windows rivals will be sorely tested.
Re:AFS server issue is a remote root vulnerability (Score:5, Informative)
for the most part, there is little listening on a mac to be exploited even if you run with no wall so usually it's not the biggest of issues.
dave
Re:AFS server issue is a remote root vulnerability (Score:4, Informative)
Actually, it's slightly simpler than this. You can add rules via the command line interface or via other tools [dyndns.org] and the Apple firewall config panel simply becomes non-functional with a note added that other firewall software is in use. IOW: no need to explicitly turn the Apple GUI off.
bad updates (Score:4, Funny)
Re:bad updates (Score:3, Insightful)
Re:bad updates (Score:3, Funny)
"It didn't say to reboot, but I'd feel better"
"Yes, I need to install everything, even if I never buy an iSight"
I just stand amazed that they've been so abused that they don't know anything better.
Re: (Score:2)
Re:bad updates (Score:3, Insightful)
It was either the IE 5 or IE 5.5 update on win98 that corrupted the OS so that it needed to be reloaded. When I worked at Gateway we told people NOT to update their browsers if they weren't having problems because we were sick of having to FFR (Fdisk, Format, Reload) people's
Re:bad updates (Score:2, Interesting)
contrarily, i've been using mac's for just over a year now and i've had one update install an ethernet driver that didn't work, and another update kernel panic my system into an unbootable state. however, i have to say that fixing these problems was way easier than anything i've seen in all the years i've been working on windows boxen.
Re:bad updates (Score:2, Interesting)
I'm afraid of doing the update on my g5 office mac. I can't afford to loose filesharing, but now that the exploit is "published" all kinds of lemurs are gonna be trying to find the unpatched macs to exploit.
Anyone else have this problem with QT for Win? (Score:2, Interesting)
Is anyone seeing this? Apple must not bother to ask Microsoft for the Windows Error Reporting data on QuickTime, because I've only submitted error reports on this crash about a bazillion ti
Re:Anyone else have this problem with QT for Win? (Score:2)
Re:Anyone else have this problem with QT for Win? (Score:1, Flamebait)
Re:Anyone else have this problem with QT for Win? (Score:3, Insightful)
dave
Re:Anyone else have this problem with QT for Win? (Score:2)
Re:Anyone else have this problem with QT for Win? (Score:2)
*sigh* because he may be running the server version of the OS as a desktop. why is there a difference between "server" and "desktop"? it's purely artificial by OS vendors. if there is a featre he needs on his desktop that only the server version allows then why should he not run the server version as a desktop OS?
when there is a "server" version of an OS, it's usually the desktop one with some restrictions removed and the price multiplied. th
Re:Anyone else have this problem with QT for Win? (Score:3, Insightful)
Sorry. If you want the extra CPU utilized, buy the server edition. If you want to serve files to more than 5 users, buy the server edition. If you want to host a database, buy the server edition.
The limitations are enough to make someone try linux-- where the border between server and workstation is a bit more fluid.
Re:Anyone else have this problem with QT for Win? (Score:1)
Are you stupid, or just an ass hole?
Mac OS X Just Crashed (Score:2)
Re:Mac OS X Just Crashed (Score:2, Interesting)
At least one update went well (Score:2, Informative)
Uh oh (Score:3, Interesting)
Re:Uh oh (Score:2, Insightful)
Windows never had an reinstall option like that...
Re:Uh oh (Score:2)
the update reset my Mail prog and erased my mail (Score:1)
Re:the update reset my Mail prog and erased my mai (Score:1)
Detail?? (Score:3, Interesting)
For example, what IPSec changes were made?
heap overflows -- how does this work? (Score:2)
I understand how to confuse the computer -- give it a sufficiently large "number of entries" such that (n+2)*16 is larger than (2^m-1).
But how does overwriting the rest of memory allow you to gain control? Surely the "execution" pointer -- where the computer is looking next for an instruction -- is in some unpredictable place relative to the code you've written in to the heap? Is this just a way to crash the machine a
Re:heap overflows -- how does this work? (Score:2, Informative)
l0pht article [insecure.org]
The farmer's security watchdog? (Score:2, Funny)
eEye?
Oh.