Apple iTunes Security Flaw Discovered? 207
brajesh writes "CNET News.com is reporting that a critical vulnerability has been found in some versions of Apple's popular iTunes that could allow attackers to remotely take over a user's computer, according to a warning issued by eEye Digital Security, a security research firm. The latest iTunes flaw affects all operating systems from Windows XP to Mac OS X, according to the advisory. The discovery of this latest flaw comes days after Apple issued its iTunes 6 for Windows security update."
So what? And what do we know about this exploit? (Score:4, Insightful)
If someone is wondering "should I be worried", the answer is no; exploits of this nature are usually still theoretical and not being exploited en masse "in the wild". Many of these exploits are explicitly discovered by the security organizations who have released the advisories themselves and are often not necessarily representative of any actual exploit being applied maliciously: the idea is to catch security vulnerabilities before they are actually used maliciously. Further, the exploit in question probably requires the user to specifically visit a malicious web site (other than a port open via Rende..., er I mean, Bonjour, when iTunes Sharing is enabled, I don't know of any other avenue to exploit iTunes). The exploit must, therefore, pass a url and/or file to iTunes, and therefore would very likely require visiting a malicious web site.
We don't know the details of the exploit, I can still say with it's extremely likely that it is not something that would be able to spontaneously occur simply by using iTunes in a normal fashion.
This story would more accurately be:
"Some unknown and unannounced flaw found in a piece of software; fix coming from software vendor"
Is this news?
(And it's amusing that if you buy a commercial product [eeye.com] from the vendor issuing the vulnerability, you'll be protected! Not a rip on eEye, who has discovered a good deal of vulnerabilities, but it's not as if many of these security entities themselves don't have an interest in finding "vulnerabilities", no matter how nebulous or unlikely.)
Re:So what? And what do we know about this exploit (Score:4, Insightful)
I can still say it's extremely likely that there is no exploit or flaw at all. Why would anyone believe it? There's no evidence of any kind that any exploit or flaw exists, at all.
This story would more accurately be: "Some unknown and unannounced flaw found in a piece of software; fix coming from software vendor"
Close, but more accurate still would be: "Some security company trying to drum up business for itself says its product will protect users from a flaw they claim exists, but offer no details or evidence for."
Re:So what? And what do we know about this exploit (Score:4, Insightful)
However, I do agree with you.
And further, it's impossible for this to a "remote execute" vulnerability like the stories based on the extremely vague advisory make it out to be: you can't even talk to iTunes remotely when it's running (unless you have iTunes Sharing enabled, which is available on your local subnet). Therefore, as I've said in another post, this vulnerability *must* be exploited via visiting a malicious web site, which then passes a url and/or file to iTunes. Period. That's the only way this could happen. It's not just something where if you run iTunes, all of a sudden you're vulnerable. Bravo to the way they've positioned it though. They probably floated out some media releases, too. I especially like the last line of the advisory:
Protection: Blink Endpoint Vulnerability Prevention mitigates any potential exploitation of this vulnerability, without requiring a patch or invasive firewall actions.
And, for what it's worth, eEye will release the "details", whatever they are, after Apple has patched whatever the issue is.
Re:So what? And what do we know about this exploit (Score:5, Insightful)
Well, not impossible. Go to System Preferences -> Sharing -> Remote Apple Events. Turn it on. Now someone can do pretty much what they want with your system. If they have a valid username/password (or you turned on the Mac OS 9 password
I could, for example, do something like: That would be mean and cruel. And it works over the Internet. And it would also require me to have a username and password on your machine.
And, for what it's worth, eEye will release the "details", whatever they are, after Apple has patched whatever the issue is.
And if they do, I will care at that time. It's the height of irresponsibility to release details in this way. The only point is to scare people into buying their product. And therefore I consider it, until actual details emerge, a malicious hoax.
Re:So what? And what do we know about this exploit (Score:2)
Re:So what? And what do we know about this exploit (Score:2)
Re:So what? And what do we know about this exploit (Score:2)
Re:So what? And what do we know about this exploit (Score:2)
Re:So what? And what do we know about this exploit (Score:3, Insightful)
Re:So what? And what do we know about this exploit (Score:2)
But they did not catch the Sony rootkit DRM, did they? Or perhaps they did, but kept quiet?
(And it's amusing that if you buy a commercial product from the vendor issuing the vulnerability, you'll be
Comment removed (Score:4, Interesting)
Re:So what? And what do we know about this exploit (Score:2)
Referring to "file sharing via Bonjour" makes as much sense as saying "file sharing via DNS". Bonjour/Rendezvous/ZeroConf is not a file sharing technology. It's multicast DNS. It's used to advertise the availability of a service - any service - to other hosts. Apple includes an Apache module, for instance, that uses Bonjour to advertise the presence of an HTTP server, and Safari uses Bonjour to look for them. But Bonjour's role
Re:So what? And what do we know about this exploit (Score:3, Insightful)
-matthew
Inconceivable! (Score:5, Funny)
Re:Inconceivable! (Score:3, Funny)
And here I thought I would avoid these problems with BeOS.
Re:Inconceivable! (Score:5, Funny)
Obligatory Princess Bride (Score:2)
Does not affect Mac OS X (Score:5, Informative)
After eEye mistakenly posted a note on its Web site saying the iTunes flaw affected "all operating systems," the security firm updated its warning to indicate that the flaw had been found only on the Windows operating system so far.
from the corrected advisory:
Operating Systems Affected:
All Microsoft Operatins Systems
No other OSes listed, just MS. So Mac OS X is not known to be affected.
So (Score:2, Funny)
(insert wah-wah-wah-waaaaaah sound)
What is it with companies shooting themselves in the foot this week?
quicktime standalone (Score:5, Informative)
Um... (Score:2)
QuickTime 7 standalone installer [apple.com], linked right from the download page as "QuickTime Standalone Installer"
Re:So (Score:2)
Re:So (Score:2)
(with that said I disable that stupid tray applet as quickly as I can on a new install of it).
Re:So (Score:2, Interesting)
Re:So (Score:2)
Interesting (Score:3, Interesting)
Re:Interesting (Score:2)
Wow. No Kidding. (Score:5, Interesting)
Wow. Software has flaw allowing remote hackery. This seems to be pretty typical of just about any piece of software written these days (or any days.)
I guess the question is, do we measure a company and its software by its base security, or by how quickly it responds to a discovered threat? I'm personally inclined to lean towards the second.
Re:Wow. No Kidding. (Score:3, Funny)
Except for the thousands of software applications that don't have network functionality!
Re:Wow. No Kidding. (Score:2)
Oh yeah we usually use those to elevate our privileges once we're in. ;)
Re:Wow. No Kidding. (Score:5, Insightful)
Both, of course. The first shows how good they are at actually designing and creating software, and the second shows how much they listen to their users/their lawyers/the press. (Take your pick.)
Re:Wow. No Kidding. (Score:2)
Both? I mean, yes, we should be forgiving of companies who have taken every reasonable step towards security when a flaw is found, so long as they patch it quickly. However, the process of securing your software shouldn't start at SP2. It should be ongoing during the development.
So I think the question is, was iT
Not "remote executable" in those terms (Score:2)
Therefore, this vulnerability must represent visiting a malicious web site, which then passes a url and/or file to iTunes. It is NOT a direct, remote execution vulnerability with iTunes itself.
Re:Wow. No Kidding. (Score:2)
That is the only possible way a program can be flawed.
Tom
Re:Wow. No Kidding. (Score:2)
Only as root (Score:5, Informative)
How's that? (Score:5, Insightful)
Re:Only as root (Score:4, Informative)
in my life I've only ever logged in as root on a Mac once. just to see what it was like.
Re:Only as root (Score:4, Funny)
And The Score Is... (Score:5, Funny)
Linux Hackers: 2
Windows Hackers: 134,443,229
You guys still got a ways to go... =-)
Re:And The Score Is... (Score:2)
s/Windows Hackers/Windows Script Kiddies/ud
Be funnier if... (Score:3, Funny)
Linux Hackers: 2
Windows Hackers: Buffer Overflow
Re:And The Score Is... (Score:2)
What was the second?
Re:And The Score Is... (Score:2)
Apple Hackers: 1
Linux Hackers: 2
Windows Hackers: 134,443,229
BSD Hackers: 0
Re:And The Score Is... (Score:2)
Bzzzt! Wrong! OS X is a BSD
Re:And The Score Is... (Score:2, Informative)
Re:And The Score Is... (Score:2)
Plus any *nix host got hit quite often if it included sendmail, bind or wu-ftpd. Sendmail has improved quite a bit in recent versions (8.12+) and bind got a bit bette
Attack vector? (Score:3, Insightful)
All they say is: 'it's vulnerable! run for the hills!'.
I don't use iTunes, so I don't really care, but what's the vector? Is it a malformed MP3/AAC file? Does iTunes run as a service that listens to a certain port, and can it be attacked through there (probably not likely, as I don't see why a music player should be listening to some port)?
This lacks information, and you really can't do anything to protect yourself if you don't know how the hell the exploit works...
iTunes does sharing via port 3689. (Score:2)
Vulnerable Operating Systems (Score:5, Informative)
All Microsoft Operatins Systems no where does this advisory say that OSX is affected, or any other operating system for that matter. This is Windows-Only, as usual.
Re:Vulnerable Operating Systems (Score:5, Informative)
you're right, only Microsoft Operatins Systems (Score:3, Funny)
I don't own an iPod, but I still have iTunes (Score:4, Informative)
Re: alternative (Score:2)
Re:I don't own an iPod, but I still have iTunes (Score:2)
Re:I don't own an iPod, but I still have iTunes (Score:4, Informative)
Why does QuickTime include (parts of) Carbon? Because it was easier to port a chunk of Carbon (or rather, the Macintosh Toolbox, which is what Carbon grew from) to Windows than to rewrite QuickTime to use the Win32 API.
Mac OS X iTunes Exploits, Clueless n00bs? (Score:2)
find / | grep -vi "Sigur Rós" | xargs rm -f
Re:Mac OS X iTunes Exploits, Clueless n00bs? (Score:2)
from TFA (Score:5, Informative)
Emphasis mine.
It would seem that remote attacks not possible unless the attacker had direct access to the machine in question first.
Re:from TFA (Score:3, Interesting)
critical vulnerability of the week (Score:5, Funny)
Where does it say it effects OS X? (Score:4, Informative)
"Operating Systems Affected:
All Microsoft Operatins Systems"
No mention of anything other than Microsoft OS'es in the provided link to the advisory.
MacOSX vulnerable? Really? (Score:2)
Operating Systems Affected:
All Microsoft Operatins [sic] Systems
Unless Microsoft wrote OSX, umm..
tragedy (Score:2, Funny)
Someone just exchanged all of my music for the complete ABBA!!!
AAAUUUUGGGGHHHH!!!!
Vector Speculation (Score:5, Interesting)
With nothing more to go on than a couple vague sentences from eEye, here's my guess:
One major thing that make iTunes different from other music player apps is the Music Store integration, which operates as a limited web browser. On OSX it calls WebKit; on Windows either Apple built a custom minibrower or it calls Explorer. Does anyone know which, BTW?
In any case, this means that iTunes accepts URLs, specifically itms://[...]. It's also capable (on OSX at least) of launching your default browser and other URL helper apps. I'm guessing that Apple did a bad job validating input, and a malicious itms URL could trick iTunes into launching a remote file as if it were a helper app. Hence the local user context. If this is the case, simply viewing an evil web page (with the itms URL as a redirect/iframe/img/whatever) in most browsers should be sufficient to start the attack.
Hopefully someone will divulge the facts soon. Let's see if I'm even close.
Comment removed (Score:4, Informative)
Re:Vector Speculation (Score:2)
OK, in my grandparent post, s/web browser/web-like XML interface/, but the general point about URL handling remains.
Ah, the old Macdonald exploit... (Score:5, Funny)
-b
Correction (Score:4, Informative)
Doesn't effect OS X. (Score:2, Funny)
Really severe vulnerability (Score:3, Funny)
Be afraid. Be very afraid. The world is coming to an end.
eEye, eEye, Oh... (Score:3, Funny)
Nothing to see here, move along. Sounds like this CRITICAL vulnerability isn't much of a vulnerability and isn't very critical...
Re:Awesome (Score:3, Informative)
Re:Awesome (Score:5, Funny)
Tell me, was it made by Pixies, or Fairies?
Re:Awesome (Score:2)
Cue the "Apples are gay" trolls.
Re:Awesome (Score:2)
Actualy, all kjidding aside, winamp was just as vulnerable, *BUT* not until AOL acquired it and started fucking everything up. WinAmp 2.91 is still the best.
Re:Awesome (Score:2)
and how does that stop someone from running an exploit from the work station? I magine the 'plug it back in' exlpoit might be used.
To be exploit free, you nede to shut off you computer, through it into a ditch, light it on fire, (add hickory for a nice mesquit flavor) and watch it burn while armed with a large caliber weapon.
All kidding aside, how do you know it wasn't vulnerable?
Re:Awesome (Score:2)
Re:Awesome (Score:2)
So it could very well be a troll, if you were trolling* for responces.
Based on your reply, I would say your intent was not to troll.Therefore your post wasn't trolling.
I am curious about your system. I have never seen iTune do that in the many differnt machines I have seen it on, and never had it happen to anyone I recommended it to. That indicates to me you may have some other issue w
TROLL (Score:2)
Troll.
I'm kidding! I've been modded a troll before for non-troll remarks. Just learn to accept that the trolls eventually get mod points and will mod you a troll because they don't agree with you.
Re:AllofMP3 (Score:2, Insightful)
Re:AllofMP3 (Score:2)
BUT, the exposure probably got a few TV/commercial deals, and most likely increased concert attendance--all of which actually earn artists money. Of course, AllOfMP3 helps with that too.
Of course, the best bet is to just drop commercial-radio crap altogether and support indi music through GarageBand, other indi sites and Podca
Re:AllofMP3 (Score:3, Insightful)
Re:AllofMP3 (Score:5, Insightful)
Second, what divinatory powers are you using to find that the security hole somehow relates to the iTunes Music Store? I'm not saying that it isn't, but that information is nowhere to be found in the security bulletin and iTunes has more network features than just the ability to hook up to the iTMS.
Re:AllofMP3 (Score:3, Interesting)
First. Please tell me, how is using allofmp3 different--morally or legally in the United States--from downloading the audio files from a P2P network?
It's easier, the files are higher-quality, and, at least in Russia, MediaServices has the rights to distribute the music that they are selling. Whether or not it is leagal for you to download those tracks has not been determined.
Second, what divinatory powers are you using to find that the security hole somehow relates to the iTunes Music Store? I'm not saying
Re:AllofMP3 (Score:2)
Well, with P2P, you aren't supporting the Mob. I'm not a fan of the mob. therefore I would be cautious about using allofmp3. To my knowledge, P2P doesn't support any bad organizations (unless you count music pirates:) )
Re:AllofMP3 (Score:2)
Morally in the united states? My morality doesn't change based on what country I'm in. (Maybe that's not what you meant to say...) Basically, I want unencumbered audio, and I think providing encumbered audio is morally repugnant, so I'll buy the tracks from whoever will sell them to me the way I want to buy them. If the record companies want my money, they'll give up on DRM. If not, they won't. If more people felt
Re:AllofMP3 (Score:2, Interesting)
Re:AllofMP3 (Score:2)
Re:AllofMP3 (Score:3, Informative)
celestina 11:21am
Organization:
OOO MediaServices
Ivan Fedorov
Planetnaya str. 29
Moscow, 125167
RU
Phone: +7 095 506-5258
Fax..: +7 095 50
Re:Is This Accurate? (Score:2, Informative)
Re:Is This Accurate? (Score:2)
Therefore:
Re:Is This Accurate? (Score:2, Interesting)
That's the definition of a "privilege escalation" vulnerability.
Malicious user A, who does not have root privileges, writes a bit of code to take advantage of a bug in application X, which has been legitimately given root privileges. The bug allows her code to run with root privileges as well, so it can then do anything it wants.
This is the kind of bug that allows a low-level but legitimate user to take control of a
Re:Is This Accurate? (Score:2)
Or, for instance, delete every data file the user owns.
Comment removed (Score:4, Informative)
Re:Bur, but.. (Score:2, Interesting)
Re:Remote code execution? (Score:2)
Naturally, it also requires whatever Bonjour [wikipedia.org] requires to work.
That is only required if music sharing is desired, of course.
Re:iTunes error (Score:2)
Re:you mean *three* OSs (Score:2)
Re:you mean *four* OSs (Score:2)