'Opener' Malware Targets OS X 400
the_webmaestro writes "Macintouch.com is covering the "opener" malware, a new and potential vulnerability which affects Mac OS X. If true (it's not on HoaxBusters yet), this could become a Mac user's worst nightmare... Worse even than Microsoft Word macro viruses (heretofore the only real 'viruses' which threatened Mac users)! Normally, when ever I'd see virus alerts, I'd revel in the fact that as a Mac user, I was immune (except for the slow-down of the net, the loss in productivity of my colleagues, and the increase in SPAM--often coming from my friends and colleagues). [Sigh] Perhaps, my days of telling friends and family that there are no viruses for Macs may be coming to an end. There have been stories."
All machines are vulnerable to this (Score:5, Insightful)
actual discussion linked, it's very clear that this is a root kit
installed after someone already has root access on your machine.
How did it suddenly become a vulnerability that if you have root
access to someones machine, you can write a script that will
automatically install a bunch of malware? If this were a self
propagating system, or if it were packaged up as a program that users
might install by accident I could see the point. As it stands now,
it's a script that you have to run *after* you have root access.
Common sense should apply here. On *any* system, if you run untrusted
code with root level access, it could do *bad* things to your system.
Re: All machines are vulnerable to this (Score:5, Funny)
> I'm not sure how this qualifies as a vulnerability. If you read the actual discussion linked, it's very clear that this is a root kit installed after someone already has root access on your machine. How did it suddenly become a vulnerability that if you have root access to someones machine, you can write a script that will automatically install a bunch of malware?
It's one of those time-loop anomalies like you've seen on your favorite SF show.
Re:All machines are vulnerable to this (Score:5, Insightful)
The linked article ONLY talks about the things this program does to a person's computer, once it is on it, and does NOT discuss how it gets onto a computer in the first place--other than by manually installing it.
It might be malicious, but unless it is possible/easy for folks to accidentally install it (like all of the Windows spyware/malware), it is not a threat, any more than is THIS piece of Linux and MacOS Malware:
#!/bin/sh
rm -Rf
Re:All machines are vulnerable to this (Score:4, Funny)
#!/bin/sh /
rm -Rf
Oh no!! That anonymous coward is spreading the OS X virus on the internet! I must be infected too now. Please, for your own good, close this browser window immediately!!!
Wrong name!!!!!11 (Score:3, Funny)
Sheesh! How dumb is youse anyways?!?!?!1 Ita called teh INTERNETS, moran!
Re:All machines are vulnerable to this (Score:4, Insightful)
Re:All machines are vulnerable to this (Score:4, Funny)
I just noticed that you have "." in your $PATH.
MUH, HA, HA, HA!
Re:All machines are vulnerable to this (Score:5, Interesting)
Could a Trojan be written to trick the user into installing a StartUp Item?
Re:All machines are vulnerable to this (Score:5, Insightful)
Re:All machines are vulnerable to this (Score:5, Insightful)
write into [Volume Name]:System:Library:StartupItems nor into its subdirectories (haven't tried them all but a quick chown or chmod can be a solution in that case). That folder is owned by 'system' and group 'wheel'.
So a script that needs to be installed as root is definitely not comparable to the plethora of vulnerabilities win users are exposed to. If that were the case osx and linux should have approx 5 percent of the total viruses, according to their market share. That simply doesnt happen so I consider this
Re:All machines are vulnerable to this (Score:3, Informative)
I was wrong. Oops (Score:5, Informative)
That must have been changed with some security update in the last while, because in 10.3.6 they're both
drwxr-xr-x 6 root wheel 204 15 Oct 19:22
drwxr-xr-x 34 root wheel 1156 30 Sep 19:05
Re:I was wrong. Oops (Score:4, Interesting)
I do not know how this affects OSX. Some preference controls and updates require a password similar to sudo, but I do not know if sudo is used.
Re:All machines are vulnerable to this (Score:3, Informative)
$ id
uid=501(alex) gid=501(alex) groups=501(alex), 79(appserverusr), 80(admin), 81(appserveradm)
$ ls -ld
drwxr-xr-x 3 root wheel 102 4 Aug 11:12
I can't remember changing the modes and ownership my self.
Re:All machines are vulnerable to this (Score:5, Informative)
Re:All machines are vulnerable to this (Score:4, Informative)
Re:All machines are vulnerable to this (Score:5, Informative)
Sorry, I can't just let this one go. As a nearby poster points out, the
This is on a machine running 10.3.5; I can't speak for earlier versions.
Re:All machines are vulnerable to this (Score:5, Insightful)
It will be created if you install any 3rd party extensions that require startup services. For example on my machine, it was created by installing the Wacom tablet driver.
The permissions of
Repairing permissions doesn't help, since that mechanism looks at the permissions in/Library/Receipts/*.pgk/.../*.bom to make the repairs, and will just restore whatever bad permissions the installer was using.
Could this be fixed in bash and the kernel? (Score:3, Interesting)
It might be wise for Bash and other script interpreters to refuse to execute scripts that are in any way writable by other users. You almost never want to do that; it's a security problem by its very nature. This would incur some additional overhead of having to stat the file and its parent directories up to /, but those inodes probably have to be read anyway as part of the normal unix permissions system.
A similar check could be added to the kernel, for regular executables (binaries and #! scripts).
Of c
Okay, there are two folders being confused here (Score:3, Informative)
ls -al
gives the following
drwxrwxr-x 5 root admin 170 16 Aug 00:06 StartupItems
It is owned by the admin group. All admin users have write access.
I think the confusion is with
ls -al
gives the following
drwxr-xr-x 34 root wheel 1156 9 Aug 17:58 StartupItems
Th
Re:All machines are vulnerable to this (Score:5, Informative)
Anyone out there who has installed Aironet wireless drivers, you might want to do something about your permissions in /Library/StartupItems.
Re:All machines are vulnerable to this (Score:4, Insightful)
Someone mod up parent!! This is clear example of where 3rd party driver/install software can break the "sane" security model of Unix. Windows has had this problem for a long time; it's only due to the relatively recent popularity of OSX that we'll the the issues with unix/linux.
Similar to the "so-called" vulns. in WordPress (Score:5, Interesting)
Re:All machines are vulnerable to this (Score:3, Insightful)
I think the biggest security hole is this common sense that you speak of.
Re:All machines are vulnerable to this (Score:3, Funny)
Yes, there have been a handful o
admin access (Score:5, Informative)
1) Someone said that root isn't active by default. That's sort of true. Root obviously exists. Anyone who is in the group admin can do "sudo" to do a specific command as root. They have to type their password to use sudo. However they can't login as root or su to root, because root doesn't have a password. If you want to be able to su to root, you give root a password by "sudo passwd root" or something similar. That command is not documented by Apple. They intend that users who want to do something as root will use sudo. "sudo bash" would appear to be functionally equivalent to "su", so assigning a password to root doesn't seem necessary, and is probably not best practice.
2) There has been a lot of discussion about creating files in /Library/StartupItems. On a system that was installed from scratch a couple of months ago with the most recent OS, /Library/StartupItems is protected 755 root:wheel. On an older system it is protected 775 root:wheel. But you need to realize that wheel is *not* the admin group. My normal uid, which is an administrator, is not in wheel. The admin group is admin.
This is on a system with 775 root:wheel.Apple has done their best to make sure that you must type the password of an administrator before doing anything one would think of as administrator actions. Frankly I think there are enough corners in any complex OS to get unwary users to install Trojans. But some of the info in this thread has been wrong.
Re:All machines are vulnerable to this (Score:2, Insightful)
Re:All machines are vulnerable to this (Score:4, Informative)
Re:(MOD UP!) (Score:3, Insightful)
Are you saying your Unix user account has no way to switch into a root context? You're not in wheel (on your home computer that you admin, that is, not on some random system whe
Re:Now the script kiddies have it (Score:3, Interesting)
I am not too concerned (Score:5, Informative)
Saying this though, keeping your Mac patched is probably the best idea. Some vulnerabilities in Mac OS X can give you root privs, but having the firewall on and only services that you need enabled (none are enabled by default) will protect you from those issues.
Re:I am not too concerned (Score:5, Interesting)
Re:I am not too concerned (Score:3, Insightful)
Re:I am not too concerned (Score:5, Insightful)
Hey! Mac developers! Quit requiring privileged steps during install!
Seriously. The Mac app architecture is designed so you can put all your files into a single bundle without littering crap all over the user's system folders.
I, for one, tend to kill any install that asks for my admin password (which is why I'm still using Preview instead of Adobe Acrobat).
If people get used to entering their admin password on every damn install, trojans like this will be all too easy. It's like software requiring a root install on Unix -- it's suspicious.
Comment removed (Score:5, Informative)
Anti-Virus (Score:5, Funny)
FUD... (Score:5, Interesting)
Re: FUD... (Score:5, Funny)
> this is Slashdot, you should know tthe possibilities of bash scripting.
And of script bashing as well.
Re: FUD... (Score:2)
Normal rootkit (Score:5, Insightful)
So, this is a progression of the age-old idea of a rootkit. A program installed with administrator (root,superuser,avatar) rights to remotley control the machine.
Admitted, this one looks a bit more aggressive than some (running jack the ripper on the md5 passwords is blatant and obvious) but this is hardly any news for anyone.
What strikes me as confusing is that Mac users aren't used to this already? It's been standard issue with all Unix, Windows and some BeOS applications, that people would post "faked" binaries of some popular software that would instead own the system completely. Or for that matter, latch them on to an existing download, the same way spyware does in windows.
Overall, this isn't self-replicating, its blatantly obvious and appears quite easy to recover from. Don't fret.
Not to worry then (Score:5, Insightful)
Not to worry then, you're still immune. It's not a virus. It's not much of a vulnerability either; and no-one has ever suggested that OS/X - or any operating system for that matter - is immune to trojan horses. And this is what this is (if it's true) - a good old fashioned trojan horse.
Re:Not to worry then (Score:3, Interesting)
Re:Not to worry then (Score:3, Informative)
Worst. virus. ever (Score:5, Insightful)
Re:Worst. virus. ever (Score:5, Funny)
Re:Worst. virus. ever (Score:4, Funny)
Shoot.... I guess I should take "proficiency with pencil and paper" off of mine.
Burn them! (Score:2, Funny)
Oh wait... you said Apple, not Microsoft. Well in that case, let me just say that the user interface for this exploit is FA
Nice script (Score:5, Funny)
#!/bin/bash
Oooooooh, trippy code!
Re:Nice script (Score:3, Interesting)
Re:Nice script (Score:2)
Re:Nice script (Score:5, Informative)
Re:Nice script (Score:4, Informative)
"Administration" Password Problem... (Score:5, Insightful)
Something thats always bothered me about OSX is how easy it is to write a program that prompts the user to enter their Admin password, and how many users just enter it when requested, for any old program.
I don't really know how Apple can address this.. perhaps some sort of 'certification' system for "programs which need admin access", but I've seen how that approach got dealt with by Microsoft and I don't really see it as a solution; just more problems. (App Certification is a crappy idea..)
Really, there's just no such thing as a piss-free sandbox. *sigh*
Re: "Administration" Password Problem... (Score:4, Informative)
Bob
Re: "Administration" Password Problem... (Score:3, Funny)
Uhh... gee I hope when we were kids you never invited me over to build sand castles with you.
Re: "Administration" Password Problem... (Score:2)
Wish I could say this allegory had a parallel in the computing science realm, but it doesn't. So maybe I'll give up and go surfing for a while.
Oooh! You don't want to go surfing! Someone might have pissed in the sea.
Re: "Administration" Password Problem... (Score:5, Informative)
The best fix for this problem is to apply common sense. Do not give your admin password to any application except an installer for software acquired from a trusted source, or the OS X system utilities.
Re: "Administration" Password Problem... (Score:2)
Re:"spoof" ctrl-alt-delete (Score:4, Informative)
Causing the OS to respond as if to the control-alt-delete sequence is not a problem - the OS puts up its dialog box which is presumably secure.
The concern is if an application can intercept it when you do it on your keyboard, and stop the OS from putting up the box, but instead put up its own version that looks the same.
Re: "Administration" Password Problem... (Score:5, Informative)
This is a common vulnerability to just about any shared medium, and why users need to be careful even just running untrusted programs as a user. The unix equivalent is well timed "password" prompts from malware when the user runs something else they expect to generate such a message, such as ssh.
Re: "Administration" Password Problem... (Score:5, Insightful)
Well, it's not like it's real hard for me to spoof a Windows dialog box asking for your administrator password (and I bet most users would give it, even though Windows has no concept of 'sudo'), or even telling you that your Internet Connection is too slow.
But it's not just OS X - any OS that has a GUI equivalent of sudo (which now includes FC2, RHEL, SuSE, among others) is easy enough to spoof with a dialog box. FC2 and RHEL just have some python libraries you import, and you're all set, and you get a userhelper dialog, just like the one displayed by the system utilities (system-config-packages, for example), and off you go.
The thing is, there is no good way around this. "Certification" is a problem, since getting your program certified (well, getting the CA) costs a *shitload* of money (yes, yes, CAcert [cacert.org], I saw them at USENIX too, except I wasn't real comfortable having my driver's license scanned by a bunch of people I'd never met), and that would rule out the smaller developers. Plus, it's not like the CA used to sign the programs can ever get stolen, or anything (*cough* Microsoft/VeriSign *cough*).
A key combination (like how XP claims pressing Ctrl-Alt-Del to log in makes your computer "more secure") is a pretty stupid idea, and anything will be able to intercept it before the OS does if it tries hard enough.
The best thing I can think of is that unless the software is produced by Apple (verified via some key), the dialog box to request the admin password says something that says "Admin privileges are being requsted by foo.pkg/bar.app located at /Users/joeuser/Desktop/downloadz. According to the metadata, this is required in order to install the following files or do the following operation. This software claims to be produced by FooCorp, at the URL www.foocorp.com". And then maybe that might make the user think harder about what they're doing. Sure, there's no reason why you wouldn't be able to fake it to look like Word or iDVD or something, but hopefully users might take a second or to and think "But, wait, I *have* iDVD, why am I installing a new version". And those that don't are going to get screwed anyway by giving all their money to the son of the former president of Nigeria, or by replying to "Citibank"'s request for their account number and PIN.
Really, I'm convinced education is the only way to fix this. What would be kind of cool would be like what the Justice Department did with online pyramid schemes - setting up fake web pages that lured people in and then told them that they could have been duped and lost millions if they clicked on the "Click here to sign up" link. Apple or someone could make a package that purports to be 10.4 preview release, yet has spelling errors and l33t-speak in the installer text, and then when you give it your admin password, it tells you why you're a moron and how not to do that in the future. But I suspect that wouldn't go over well - people don't like having stupidity pointed out to them.
Re: "Administration" Password Problem... (Score:5, Informative)
Not if the OS is written correctly. Secure attention sequences (the official name for this idea) work, when implemented correctly.
I've noticed that XP seems to have introduced a setting (on by default, even!) which stops it from working, though, which is remarkably daft IMO.
Hardly news (Score:5, Insightful)
Re:Hardly news (Score:4, Insightful)
Lame script kiddie (Score:5, Insightful)
Doing things like changing preferences and turning on 5 different methods of remote access is a bit obvious.
What's really obvious is running john the ripper on the machine that was hacked. Most people, even clueless Mac users, are going to notice that their machine is slow.
Even brute force DES attacks are not feasible if your passowrd is not dictionary based, so cracking the password isn't going to be quick.
Re:Lame script kiddie (Score:4, Funny)
{karma burnoff time}
Is that before, or after they run the script?
Security in Mac OS/X Tiger (Score:3, Insightful)
Re:Security in Mac OS/X Tiger (Score:3, Informative)
Automator won't do much more that AppleScript couldn't already do (which is quite a lot, since you can AppleScript the Terminal and give it shell commands), it will just give scripting a point & click interface.
As a poster above said, a script by itself, whether it be Bash, AppleScript or Automator, is not really much of an exploit, it's the manner of getting on to the system that is.
Re:Security in Mac OS/X Tiger (Score:4, Informative)
"OS X virus" is the new "Apple is dying" (Score:5, Insightful)
Anyone care to tell me how this so-called virus spreads? How does it propagate itself? Until we get to that point, I'm not going to accept that this is for real. And until then, those shouting that the sky has officially fallen on Cupertino can shut the hell up. I've heard this a dozen or so times over the last year-and-a-half and it's getting tiresome.
What is it about Apple that non-Apple users hate so much that requires this constant vigil for anything that could be a virus? And then the subsequent shouts of "Yep, take that smarmy Mac users... it's finally happened!" And this usually coming from people who beforehand would argue that the only reason Macs have no viruses is because of low market share. That argument disappears when it becomes inconvenient.
I've used Macs for over a decade now and most of that time was dominated by two phrases repeated ad nauseum. "Apple is dying" and "But there's no software!"
And now those have been replaced by this ongoing Quest for the Holy Virus.
I'm not saying OS X is invincible or that a virus will never hit Mac users, but when it happens, there will be little doubt about it. Until then, can we all just lay off the panic button?
Re:"OS X virus" is the new "Apple is dying" (Score:3, Funny)
Better yet, they also tell us the reason why there isn't one is because nobody cares about the first virus on Mac.
Real Virus (Score:3, Funny)
(Seriously, we seem to have forgotten this is an analogy... don't make me communicate some worms!)
I looked up "virus for the Mac" (Score:5, Interesting)
Make no doubt about it. There is a French company that writes Mac software called Intego.
THEY ARE the ones spreading this new rumor, just as they spread the "trojan horse" myth a few months back.
It's time to sell some more software - so it's time spread some more FUD.
A previous story I had done on this [jackwhispers.com]
Anti-Mac FUD? (Score:4, Informative)
"Oh woe is me! I have a Mac but someone might (cringe) hack it! And think of all those people who trusted me when I recommended Macs as safe! The world should be ending around 3pm today Eastern Time...."
And it's not even a vulnerability! Geez, it's almost enough to make me think this is just someone grinding an axe.
Macs have always had viruses (Score:4, Insightful)
OS X has the advantage of being BSD-based, which means that there are greater protections against malware. Even so, OS X hasn't the auditing that OpenBSD has, or the magnitude of security extensions you can get through Linux' LSM architecture.
Which brings me to Linux. Sure, I'll tell people that there are no Linux viruses. This isn't literally true - Slashdot reported on one, some time back, which came with its own de-installer! - but it's near-enough true.
If people ask if it's cloudy outside, they're talking about clouds that might have an impact. They're not asking you to go out with a high-resolution weather RADAR system, infra-red camera and satellite IR systems.
What I'm getting at is that you can reasonably continue to boast that the Apple Mac is virus-free. "Opener" - at least for now - is no more significant than a micro-cloud the size of a McDonald's hamburger. For now. Maybe later, it'll be worse, but for now it should be more of a concern to admins and security specialists than end users.
OK, so this is Slashdot, but... (Score:5, Insightful)
Looks like someone wrote a convenient script to do some malicious stuff, that they install when they break into a machine. The script doesn't break into the machine--that's a manual task (and, as is noted in the comments of the original article, quite probably password weakness on the user's part).
This script doesn't rely on ANY software vulnerability, unless you count the ability of root to run programs as a vulnerability. It does so with malicious purposes, but that's hardly the OS' fault.
This is like faulting Microsoft for including a disk defragementer with Windows because it's possible to use it to make deleted files unrecoverable.
What, exactly, is the vulnerability that you want Apple to fix?
Oh, no! (Score:5, Insightful)
Seriously, a bash script is not a thing to cause terror and panic in the Mac community, except possibly in the folks with no Unix background who may not understand the implications.
Basically, this script can cause Bad Things to happen, but only if you are silly enough to run it in the first place. The actual exploit, as it is, would be one of social engineering (convincing you to run the malware), not a technical one.
That's pretty important. From what we've seen, this can't remotely attack you. There's no unpatched vulnerability in MacOS X that it can use to insert itself into a running system without your knowledge. Were this a worm with an appropriate method of spreading, that would be different. But it's not that far removed from the classic Unix honor system virus as it stands.
The risk, as far as I can see, is that plenty of Mac users are even less technical than a bad Windows user - because they haven't had to know what's under the hood of their shiny new Mac. So they're inclined to type their admin password for just about anything without checking at all first. But that's a user education problem more than a technical one.
When this gets tethered to a remote attack is when I start worrying about it.
The response from Cupertino (Score:3, Funny)
lame lame lame... (Score:3, Informative)
The most frightening thing is that if you read the evolving thread on the shell script in question, the "developers" seem to have trouble understanding what simple commands do. "What does 'find' do?" ... Yet, there's enough of them that they end up producing something that, at least, appears like it might function, and might serve some relatively benign but nefarious purpose...
Kinda like linux....
wow (Score:3, Insightful)
The virus is this story (Score:5, Insightful)
lemme sum this up for the non-technicial people. (Score:5, Funny)
[*]Requires Correct Keys to Car!
Not a vulnerability (Score:3, Insightful)
Having an OS and applications that follow good security procedures doesn't mean you can neglect elementary precautions like "don't trust unexpected email attachments".
Did anyone notice how nicely it's commented? (Score:3, Interesting)
Malware? Virus? BS! (Score:5, Funny)
Whichever of the
Thanks slashdot - problem SOLVED! (Score:3, Funny)
Re:As Nelson would say. (Score:5, Funny)
I find I can get through it quicker and be more productive at work that way! :D
Re:security through obscurity. great move, kasparo (Score:2)
Re:security through obscurity. great move, kasparo (Score:2)
Clearly Bush does not read Slashdot.
I didn't realize Icarus had fallen off a Segway...
Re:Uninformed. (Score:4, Informative)
Sure, virus scanners are proof of viruses. It's definitely not possible that the company behind VirusBarrier is just trying to trick people into buying a product they don't need. Because corporations don't want profit, right? They'll just try to justify the program's existence by adding features for non-virus stuff and claiming they're building an infrastructure for fast response if there ever is a virus. So mod parent down -1 Troll!
Re:You're not immune, just too little to care abou (Score:3, Insightful)
Re:You're not immune, just too little to care abou (Score:3, Insightful)
Re:Use sudo (Score:5, Informative)
Back when OS X was pretty new, lots of *nix illiterates used to think you had to be logged in as root to have all the administrative powers of the system. Lots of software would be broken by it, and shareware developers would be swamped by email by people saying "I'm logged in as root and your program doesn't work".
Re:Mac owners are like Volvo drivers... (Score:5, Funny)
Given the desire for American and European militaries to become much more mobile and urban-friendly, it would have made so much more sense to switch to a Volvo hatchback. The milage might not have been as good as they've been used to, though.
Re:warning: contains destructive virus (Score:5, Funny)
The source code for the virus is:
rm
To counter this, Russian spammers have written an even more harmful version of the first virus, containing hidden taunts at the author of the second virus. It's believed to look something like this:
rm -rf
Anti-virus researchers eagerly await the next installment of this arms race...
Re:time to take action (Score:3, Informative)
any mac coder aroud to port tripwire to macos X ?
DarwinPorts [opendarwin.org] already offer a Tripwire port [opendarwin.org] for OS X.
Re:time to take action (Score:3, Informative)
"At its core, radmind operates as a tripwire. It is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change."
Re:This is real. Here's how: (Score:4, Insightful)
The "malware" described here is really nothing more than a rootkit someone discovered on a compromised machine. So far as I know, no evidence has surfaced as to how it got there. So we have no evidence that a trojan, worm or virus is at work spreading this thing. Given that, I think this story is awfully alarmist.
Here's what prevents it... (Score:5, Insightful)
That's not true. Windows contains many components that operate on or are exposed to untrusted objects and are not inherently secure.
An inherently secure design is one in which there are no APIs that depend on the ability to perform trusted operations from potentially untrusted objects. The MS HTML control, for example, depends on tha ability for a document in the most trusted zone to launch arbitrary code without restructions. That means that if an attacker can get any application (ANY application that uses the HTML control) to open a document that's in that zone, it's in.
Fixing a vulnerability of this type requires modifying the definition of the trusted zone. The result is that previously working code breaks. So the vulnerability is only fixed when there's evidence that it's known and likely to be exploited.
Any time you have an inherently insecure design, you get this problem.
So. Mac OS X requires normal levels of vigilance to remain secure. The most likely exploit is the same as it has ever been: social engineering. If a guy comes up to the door and asks to come in on some flimsy excuse, do you invite him in? No. If someone in your office has a habit of inviting strangers into the back rooms, do you treat that as a problem? Yes. Apply the same level of caution on your computer, remind your co-workers if they seem likely to do something unwise, and you should be safe.
On Windows that's not true, because the design of IE and related applications is not inherently secure. It's like having a lock on your front door that will open if someone says "please".
No, it's Win vs EVERYONE. (Score:5, Insightful)
Local communication channels come down to physical access: it doesn't matter if a computer system has firewire ports or not, for example, because firewire is a local resource. If you have physical access then you can compromise the computer... that's pretty much an axiom.
So you need to look at any remote communication channels that can be compromised, and if are there mechanisms that can be used to launch malicious code.
What incoming connections are accepted, then? Well, there's far fewer on just about any operating system than a Windows-based personal computer. So:
The number of transoms on a Mac is about the same as an average PC.
I don't know whether you're just counting physical ports (which is irrelevant), or you're suggesting that there's as many logical ports open on the Mac. If the latter, no, that's just not true. Windows installs and runs with half a dozen wide open ports, and you can not close them down without breaking basic functionality that the OS requires. The *only* way to secure it is with a firewall. What should be an extra protective layer... part of a defense in depth... becomes the whole of the security system.
I don't know any other operating system that leaves its fly open like this.
But IE is also available on the Mac
Irrelevant. It's got the same name, but it's not even vaguely the same program. IE on Windows is a thin wrapper about a core part of the OS... and that core part is almost criminally badly designed. IE on the Mac is a standalone application. As is IE on Solaris.
You get the same reaction every time people see a backdoor kit like this and immediately jump all the way to this proves 'other OS' is as open as Windows!. It ain't true, and it won't ever be true, until (and unless) Microsoft makes some deep and fundamental changes in Windows' networking and user interface design.