Flaw Found in Apple Bug-Fix Tool 168
eldavojohn writes "The Month of Apple Bugs (MOAB) is well under way with a startling bug released Monday. From the description: 'Application Enhancer (APE) is affected by a local privilege escalation vulnerability which allows local users to gain root privileges.' APE is the same software used to deploy fixes during 'The Month of Apple Fixes' (MOAF). I know it's confusing but MOAB came first and MOAF was a developer's answer to the bugs — after all, the purpose of posting bugs is to have them identified, confirmed and eradicated. The article talks about potential remote root access by an intruder. Note that this is third party software that all of the bugs seem to be stemming from. I guess Apple has made a fairly secure system but they can't expect all third party developers to follow the same rigorous standards."
A HA! (Score:5, Funny)
I see it now. This entire MOAB thing is just there to tout how great and secure Apple Products are, and that the only bugs possible HAVE to come from 3rd party software!
It is all a plot by Jobs!
A PLOT I TELL YOU!
[/psycho]
Re: (Score:2)
Starting to get annoyed (Score:2)
From TFA:
Well, well, well (Score:3, Funny)
Re: (Score:2)
(Vista really does seem terrified that someone else might be touching your computer)
Windows comes with his bug pre-exploited. (Score:2)
But more importantly, in Windows everyone runs as a member of L
Personally I think (Score:2, Insightful)
Errr... (Score:4, Informative)
So far MOAB has released 2 bugs for QuickTime, 1 for iLife, 1 for DiskManagement/diskutil, and 1 for Finder.
Re: (Score:2)
Re: (Score:2)
2 of these products are Core to the OS
Well, not exactly. Since you didn't say which, I'm going to assume that you mean 2 of the following 3: Quicktime, Finder, and DiskManagement.framework. Quicktime is just an app with a set of codecs and some plugins (all removable). Finder is just an app, and while the method for doing so is not GUI accessible, you can in fact turn it off and use something else (i.e. the terminal, or PathFinder). DiskManagement.framework is just an API for easier/higher level access (higher than say mount or umount) to d
Re: (Score:2)
Re: (Score:2)
I don't by the 3rd party thing as an excuse... and I AM an Apple fanboi
Instead ... (Score:5, Funny)
Technology needs more catchy acronyms
MOAB (Score:3, Funny)
Re: (Score:2)
Yeah ... guess they'll have to write a bug-fix tool for the bug-fix tool now.
I might be missing something, but.... (Score:3, Insightful)
Re: (Score:2, Insightful)
Anatomy of the Runtime MoAB Patches (Score:5, Informative)
------
01:04 Tue, 09 Jan 2007 PST -0800
Anatomy of the Runtime MoAB Patches
Introduction
For the past few days I've been releasing patches for software vulnerabilities in an assortment of Mac OS software. This project was intended to be a technical one, and I've never sat down to explain, in clear terms, how the patches work, what Application Enhancer is, or what the potential risks are in running these patches. I'm also not the first one (not by a long shot) to think of implementing third party patches for unpatched software vulnerabilities, either, and I'd like to discuss those efforts.
Here goes
Third Party Patches, Past and Present
Generally speaking, a software vulnerability is usually announced in coordination with a vendor-supplied software update. However, there are cases when a vendor patch is not available for a critical software vulnerability, leaving the user with limited options. Relatively recently, the idea of a "third party patch" has emerged; when a vendor patch is not available, a third party can reverse engineer the software in question and produce a temporary bug fix.
This technique has previously been used for both unpatched Windows and Mac OS X vulnerabilities. In 2006, Alexander Sotirov presented "Hotpatching and the Rise of Third-Party Patches" at the Las Vegas Black Hat conference, and is responsible for implementing two patches for unfixed Internet Explorer vulnerabilities. ZERT (Zero-day Emergency Response Team), who is composed of an impressive array of individuals, "work(s) together as a team to release a non-vendor patch when a so-called '0day' (zero-day) exploit appears in the open which poses a serious risk to the public, to the infrastructure of the Internet or both." On the Macintosh, Unsanity released Paranoid Android, a run-time patch for a critical vulnerability in Mac OS X's document handling. I believe the award for the first third party Windows patch for an unfixed vulnerability goes to Ilfak Guilfanov's December 2005 WMF patch. Guilfanov is the author of the excellent IDA Pro disassembler and debugger.
Risks and Benefits of Third Party Patches
A vendor-supplied update is always preferable to a third party patch. Third party patches are created by reverse engineering the vulnerable code, and are subject to limited testing and potential implementation deficiencies -- like the author of the vulnerable software, patch implementors are human, too. It is always possible that a bug in the patch could result in instability, or potentially expose a new exploit scenario.
On the other hand, a third party patch can provide protection against a critical vulnerability before the vendor is able to implement, test, and release a fix. The decision to use a third party patch should be made after a careful assessment of the vulnerability's risks and your own requirements -- it's never unreasonable to wait for an officially provided vendor fix.
Patching (more) Safely with Application Enhancer
The patches we've provided have all been implemented using Unsanity's Application Enhancer, and are "run-time patches" -- the patches insert themselves into applications at runtime, find the vulnerable code, and apply a band-aid. Nearly all of the patches released so far work by wrapping the vulnerable code and providing additional data validation, rejecting data that would otherwise cause the vulnerable code to malfunction (and thus allow the exploit to succeed). There are other options for implementing run-time patches on Mac OS X, including the open source mach_star -- I've previously used mach_star to implement runtime security patches for software on my own Mac. However, for the purposes of providing these fixes, I decided upon Application Enhancer.
Application Enhancer provides a nice, easy to use GUI for installing Applicati
Sticking up for APE (Score:5, Informative)
The vulnerability is that APE installs itself in /Library where its supposed to go. /Library is writable by local admins. So a local admin can replace the APE executable and gain root privileges. Read that again. A local admin can replace the APE binary to gain root access.
A local admin, an effective root user account, can gain root access.
Or they could open up NetInfo Manager and enable the root account and enter in a password of their own choosing and then log into the GUI as root. Or they could open up Terminal and run sudo sh and get a root shell.
This is simple revenge. Rosyna called them trolls [unsanity.org] and linked to an APE fix for one of their bugs. I think Rosyna may be right of the 9 published bugs, 4 of them are not from Apple provided software.
Re:Sticking up for APE (Score:4, Informative)
The problem is rather that a trojan or similar run by a clueless admin can gain root access without the user being prompted for his password. Most Mac home users do use an admin account for day-to-day work, and think that they'll be fine. So the real problem is either that too many Mac users are running as admin, or that admin users have too broad write permissions without using sudo.
Personally I've solved this by using a normal user account that's added to sudoers. I can wreak full havoc on my machine when I want to, without having to log in as my admin account, but can't do so unknowingly (I hope).
Re: (Score:2)
You do realize there are about 50 brazillion ways to do this, correct?
Either way, as soon as you're running malicious code, you're already screwed. A malicious application does not need to be root to destroy your photos, movies, pornography or other personal documents. You should never run applications from a source you do not trust.
Re: (Score:2)
You do realize there are about 50 brazillion ways to do this, correct?
Indeed, which is why the default configuration for Macs is so troublesome. We may mock Windows users for having to run as admins to get their poorly written software to work, but most Mac users run as admins out of ignorance, because that's just the way the default configuration is. Or was, the last time I installed OS X at least, but I hope I'd heard if things had changed.
Either way, as soon as you're running malicious code, you're already screwed. A malicious application does not need to be root to destroy your photos, movies, pornography or other personal documents.
At least with a non-root the damage is localized to one account. Daddy's porn may be gone, but his daughter's homework (and porn) is s
Good point... (Score:2)
Not to minimize the problem (and it IS a real problem) but this is important.
Security is like sex. Once you're penetrated you're fucked.
You should never run applications from a source you do not trust.
Don't forget to turn off "Open 'Safe' Files After Downloading" in Safari.
That should be a surprise... (Score:2)
A malicious application running as an "admin" should not be able to gain root access.
No wonder Apple didn't care that aliases bypass traverse checking. That's a *minor* problem by comparison.
So the real problem is either that too many Mac users are running as admin, or that admin users have too broad write permissions without using sudo.
The real problem is that admin users have too broad
Placing the blame in the right place... with Apple (Score:3, Informative)
Too many words. Let me fix that for you: The vulnerability is that
Even if you don't install APE on your system, an attacker who has the ability to execute this exploit can simply drop an input manager or other plugin into
I hope you're mixing up your directories. (Score:2)
They should not be writing to
They should be writing to ~/Library (that is, the Library subdirectory in your home directory)
Any application that attempts to write directly to
Apple Bug-Fix Tool? (Score:5, Informative)
APE is developed by Unsanity and it's not a "bug fix tool."
It's a third party framework and daemon used for a number of thing.
Summary to date... (Score:4, Informative)
This statement doesn't make sense. The MOAB issues outlined to date have been a combination of Apple and 3rd party issues. See the following break down...
MOAB #1 - Apple issue
MOAB #2 - 3rd party issue
MOAB #3 - Apple issue
MOAB #4 - Apple issue
MOAB #5 - Apple issue
MOAB #6 - Apple and 3rd party
MOAB #7 - 3rd party issue
MOAB #8 - Apple and 3rd party
MOAB #9 - Apple issue
Re: (Score:2)
How is number 8 an Apple issue? It is an overflow in a third party application.
Re: (Score:2)
#8 involves APE (Unsanity folks could make some changes to help avoid the issue) however IMHO the core of the issue is with file permissions that Apple has defined for various directories under
Re: (Score:2)
IMHO the core of the issue is with file permissions that Apple has defined for various directories under /Library that Apple recommends 3rd parties install software into.
The security hole is in APE. The fact that you disagree with Apple's permission choices is pretty irrelevant. OS X does not stop Adobe Acrobat from being installed either, does that mean any hole in that reader is also partially Apple's fault?
Re: (Score:2)
It's not a disagreement. Apple's default permissions on that directory are plain wrong. APE is just an example application that proves the point. The actual fault lies with Apple.
I think the real problem here is that the MOAB deniers are woefully ignorant of the problems. They think they can make up for their woeful ignorance with chest-beating. I've been nothing but disgusted with the Mac co
Re: (Score:3, Insightful)
Apple's default permissions on that directory are plain wrong. APE is just an example application that proves the point.
This is just wrong. The framework file is installed by a third party application, which sets the permissions. Giving administrators the right to set permissions is a design choice, and arguably a bad one, but it is not a bug in and of itself.
I think the real problem here is that the MOAB deniers are woefully ignorant of the problems.
Deniers? What the project isn't happening? I'm pis
Re: (Score:2)
I have. And my estimation of your worth has diminished considerably.
Your factiness is compelling. Unfortunately the facts disagree with you. Despite your claim that these guys aren't notifying Apple of these bugs in advance, they claim that they have, and I find them a whole lot more convincing t
Re: (Score:2)
I'm not going to address your points one by one, because I don't have the time and they don't deserve it. Some of the items you reply to were not even in my post. But I thought I'd address your conclusions.
Apple? I see complacency and rhetoric and outright deception . Then I see ignorant - yes, I think you are ignorant - pundits such as yourself who would attack the messenger rather than admit there's a problem.
Ahh, a problem eh? How many Macs have been compromised this year by worms? Oh yeah that would
No, it's APPLE'S permissions that are wrong. (Score:2)
Re: (Score:2)
After all, there seem to be a lot of people on /. who have jumped on MS for not making people run as non-admin before Vista; and what's that besides just choosing a poor set of default permissions?
There is a difference between a design not being as secure as possible and a vulnerability. I blame Microsoft for both poor security design for the current climate, and for lots of bugs, but I don't confuse the two and claim that because a local program was compromised, that is a bug in MS's OS. MS should provi
InputManagers in general (Score:4, Informative)
The "designated location" is actually one of several: /Library/InputManagers/ or ~/Library/InputManagers/. In other words, it doesn't take special privileges to make an InputManager bundle active on a given system for a specific user. You do have to have admin privileges to place the bundle into /Library/InputManagers/ so that all applications executed by all users are touched, but that's it.
Objective-C lets objects of one class "pose" as objects from another class. Posing is like dynamic subclassing; method dispatch happens against your class first and then on up to the original class if you didn't implement it or if your method specifically calls the "parent." This is where code injection comes in. You write a new class that poses as some class in the application and intercept the calls; your code starts executing.
Figuring out the application's classes isn't difficult. A free utility like class-dump [codethecode.com] can be used to grab an OS X application's class and data structure definitions, and from there it's easy write your own posing classes. Lots of bugs arising from injected code is due to sloppiness on the part of the programmer, and some of it is due to an InputManager modifying an application's data at the wrong time (which is easy to do, because the application rightfully believes that it owns its data).
I was going to write something about the security issues this entire scheme raises, spelling out how a nefarious programmer could hijack passwords and the like. I'll leave that to your imagination, though.
Shameless plug: While I didn't use APE, I did use InputManager technology in order to create Concierge [bti.net] (a bookmark manager for Safari, in the form of a drawer).
Re: (Score:2, Insightful)
Not quite... InputManager only works with Cocoa applications, as the CocoaDev page you cited mentions, and class posing will only work with parts of applications written using Objective-C classes.
APE uses mach_inject and mach_override to actually patch new code into applications loaded into memory. This works at the kernel level and thus is framework and language agnostic.
I stand corrected (Score:2)
Thanks for the clarification!
Bugs in apples.. (Score:4, Funny)
Re: (Score:2)
We need more acronymns (Score:2)
MOSES
BALAAM
Wow! (Score:2, Insightful)
So, when Apple does it, it's OK, but when Microsoft does it, they've obviously made a flawed system and deserve to be beaten about the head with an office chair?
I know this is
Re: (Score:2)
http://apple.slashdot.org/comments.pl?sid=216122&c id=17546398 [slashdot.org]
Not to mention Adobe and everyone else who shows up when you run that find command.
Hah, security. (Score:2)
In the words of Walter Sobchak: (Score:3, Funny)
Reading that summary as a Mac user, I just can't be bothered to sort all of this out.
It's not an APE bug, it's a big Apple bug. (Score:5, Informative)
ANY application run setuid, or any framework or plugin used by any application run setuid, could have been used to demo it. It's got nothing to do with APE. This is no different from the many privilege escalation issues in Windows caused by writable executables and system directories.
To tell if your Mac is susceptible to this kind of privilege escalation attack, run this command:
find
If there are no results, then your system is probably safe. If there are more than a few results, then you're likely vulnerable.
Try it and see.
Re: (Score:2)
Anyone got a scratch monkey? (Score:2)
I don't have a scratch Mac to test it on, anyone?
More fun... (Score:2)
Try "find
It's not just "admin", and that shouldn't be root. (Score:2)
It's worse, any user on an OSX box can probably give themselves root privileges with a little patience. The default permissions on
How is this really any different from simply being an admin? AFAIK, the
Third party software? (Score:2)
Quicktime, Finder and iPhoto are third party now?
I guess the kernel is also third party by zealot logic then - or at least it will be after they start publishing the kernel level exploits. Kind of like what happens after a proof of concept virus gets announced for OSX - the zealots simp
this makes no sense (Score:2)
The description of the flaw is misleading. (Score:2)
This is not a flaw in APE. Any existing plugin or a new plugin could have equally well been used. The flaw is that
Re:Story at 11 (Score:5, Insightful)
Re:Story at 11 (Score:5, Insightful)
Look, while they have included some legitimate bugs it's pretty obvious the project is flailing around somewhat, given that it's only the 10th of "MOAB". In addition to the APE flaw, they've included a VLC flaw and an OmniWeb flaw - neither of which is part of OS X nor installed on any stock Apple box. Additionally they've included a PDF flaw, which isn't even specific to OS X! That's just plain silly.
Re:Story at 11 (Score:4, Insightful)
I guess it depends if the purpose of publishing the bugs is to fix OS X, or whether it's to educate Apple users that just because you use OS X, you are not immune; it's possible (probable?) that somewhere on your system there will be vulnerabilities.
If you think that is the purpose of the MOAB then you're very, very optimistic, perhaps naive. The purpose is to gain publicity for a few, unscrupulous researchers. They've done this before with other vendors and even agreed to cancel one such project after being paid off. Apple users who know anything about security know there is the potential for security flaws, but they also know the potential is much less than if they are running Windows. Apple users and potential Apple who don't know anything, may be confused by this into thinking that OS X is no more secure than Windows and hence stay with Windows. The simple message "use a mac and you're unlikely to suffer from worms and viruses" is true and simple enough for most people. Complicating the message with, "but if you're using some third party utility, or even some included utilities there is the possibility someone could write a worm, but tso far no one has and they are unlikely to do so in the near future" is way too complex.
At minimum, it's a reminder that whilst OS X is more secure than Windows XP natively, it is not immune from vulnerabilities.
Finding vulnerabilities and not reporting them to the vendor or making them public until it will get you the most press, is detrimental to security and does more to help black hats than it does to help users. Trying to obscure and complicate the simple message that mac==more secure than windows, likewise is detrimental to overall security. The only thing this project is really accomplishing is publicity for themselves at the expense of everyone else. These guys are anti-security researchers. If they aren't willing to behave ethically, they can rot.
Re: (Score:2)
I tell people that Macs or anything but windows are safer because less people care to attack them. I tell them that they must run software update and every two versions of Mac OS they must upgrade. (Apple stops patching after 2 releases) There ar
Re: (Score:3, Insightful)
No, the price of using a computer is to patch it and not run untrusted software.
Bullshit. That's like saying the purpose of forks is to eat vegetables, and if some forks happen to create a toxic substance when they touch other substances, it is not a concern. People want to run untrusted binaries, because the majority of binaries people run are untrusted to some degree or another. When malware is common, it makes sense to make sure that untrusted binaries are restricted by default.
It does not matter w
Re: (Score:2)
Apple, Inc. did suggest that they can't get viruses. View their television ads. http://www.apple.com/getamac/ads/ [apple.com] (V
Re: (Score:2)
Apple, Inc. did suggest that they can't get viruses... Since I consider Apple an authority on Apple computers, I think that backs it up.
No, Apple states that they don't get viruses, which is true, to date they have not had any in the wild viruses, with possible exceptions being so obscure and useless as to not really count. If you bought a Mac 5 years ago, the chances that you caught a virus on it are infinitesimal, unlike Windows, to which they are directly comparing OS X. Their commercial may not tell
Re: (Score:2)
Also because there are systematic security problems in Windows that are inherently unfixable without breaking working applications.
For example, simply not using Microsoft Office or Internet Explorer (or any other application that uses Microsoft's flawed HTML control or trusts random serialised COM objects... most of which are Microsoft apps) is a more effective anti-virus and anti-spyware solution than just abo
Re: (Score:2)
Personally, I think the solution to this is for MS to break compatibility with those apps -- after all, they've been breaking compatibility with other apps ever since Windows 2000... Vista kills even mor
Re: (Score:2)
It's a LOT easier now than it was when the alternative was Netscape 4, friend. Don't "lock it down tight", just don't use it at all until you actually need to for something that matters (that would be 'you can't get to your bank account without it'... not 'Youtube is screwing up with Firefox').
Of course, as soon as someone finds an attack vector usable with Apple Events, OS X will be the Emperor's new OS.
Indeed. I am not at all
Re: (Score:2)
Actually, it's absolutely certain that almost no matter what system you're using there will be vulnerabilities. Just because they haven't been found and exploited doesn't mean they're not there - lack of evidence is not evidence of lack, and all that.
Re: (Score:2)
What they write on their Web page is pretty irrelevant when they create a project called "Month of Apple Bugs." To blatantly rip off The Simpsons, "...for every dollar of Krusty merchandise you buy I will be nice to a sick kid. For legal purposes sick kids may include hookers with a cold."
It's the zealots own fault for attracting attention in the bad manner for claiming such lofty security, of course someone is going to look at it.
This such such a tired and sad implicit assumption. Who on Slashdot has
Re: (Score:2)
One of the biggest security advantages the OS X has is that Apple has such a small market share that hackers/malware and adware coders/etc. don't bother to mess with it. If everyone switched, then you would lose that advantage and OS X would end up just as much a malware/virus/trojan/expl
Re: (Score:2)
Re: (Score:2)
Yes, there may be network effects to consider when setting the desirability to attack a given platform, but the 'pure market share' idea is just plain bullshit.
Equally tired response #1: webservers -- Apache has the largest market share in httpds, but it lags well behind IIS in exploits.
Equally tired response #2: coefficient of correlation -- If market share is the only metric that matters, what's the CoC for exploitation? It can't be linear (N% market share equals N% of
Re:Story at 11 (Score:5, Insightful)
I don't know about you, but if some one found a bug in Windowblinds, or some other Windows skinning app, and said it was MSFT's fault then I would be suspicious too.
Also there is a bug in VLC. how is a VLC player bug that is also found in the windows and linux versions an "apple" bug.
If it's an apple product by all means go for it. But no one blames MSFT for bugs in Lotus Notes.
Re: (Score:2, Interesting)
If it's an apple product by all means go for it. But no one blames MSFT for bugs in Lotus Notes.
from the faq on the first page [info-pull.com]
3. Are Apple products the only one target of this initiative?
Not at all, but they are the main focus. We'll be looking over popular OS X applications as well.
So they are not blaming apple anywhere in their site or implying this vulnerability is apple's fault at all. Where did you get that idea? This is not a project to destroy or harm apple, quite the opposite, it will help them in the long run.
Re: (Score:2, Funny)
Um, from the title of the "project", which is "Month Of Apple Bugs". Golly, how could I possibly have been mislead?
Re: (Score:3, Interesting)
Re: (Score:2)
In the title, which isn't "Month of Bugs, Some of Which Are In Mac Software."
Re: (Score:2)
DOS ain't done until Lotus won't run? [slashdot.org]
Of course in that case, from MSFTs perspective that was a feature, not a bug.
Re: (Score:3, Funny)
The report talks about the ability to change permissions and then use those changed permissions to run programs as root. Maybe it's just me I'm pretty sure i
Re: (Score:2)
You'd still have to run a program that does nasty things, and that program would still have to be launched with admin privileges. Once you get to that point, it doesn't really matter how the rest of the system behaves -- the best you can hope for is some sort of log. Anything else would prevent you from actually using the system.
Fo
Re:Story at 11 (Score:5, Informative)
But their report says that in trying to expliot the flaw their DMG failed validation test done before mounting the image and that they were therefore unable to create a working exploit. The rest of their report is based on the assumption that they could manipulate parts of the DMG file and bypass the validation already in place, without any real indication of how that might happen.
Re: (Score:2)
Because journalism is a business, and that means it isn't concerned with relevant truths; it wants "storylines" that will generate interest and therefore revenues. It's a cute storyline for them that the application enhancer used to patch bugs has a bug. Hence, it gets reported and others don't.
Re: (Score:2)
Well Application Enhancer is the software being used to apply the temporary bug fixes until the MOAB bugs are actually fixed by their vendors, and now a MOAB bug as been found in the APE software itself. So it's rather like those Microsoft patches a couple months back that while patching their venerabilities as designed created new holes.
Re: (Score:2)
APE has been known to be an attack vector for years... it's a third party piece of software that lets other third parties make untrusted changes to the OS X kernel using a simple API. There are some really neat things done with it, and there have also been a few really buggy plugins made for it that can mess up the OS. Usi
Re: (Score:2)
The APE hacks were never meant to be permanent, but they were better than nothing. One of the nice things about this "solution" is the underlying code on disk is not changed, so users don't have to do clean installs before they add in the vendor approved patch.
I don't think it's a coincidence that this exploit came out. I'm sure the "researcher" hasn't been too pleased with the efforts to patch every flaw as soon as its released. It's taken quite a bi
Re: (Score:3, Informative)
I disagree with "at its best". The example "exploit" installs what basically amounts to a rootkit. So, in other words, this security "researcher" is distributing malware that gives him access to anyone's computer that accesses it. Since when do real security researchers distribute malware? More information is in the comments here [unsanity.org].
Not to mention he posted this thing with nothing but malice. It was done because Landon Fuller refused to work w
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
So it would be fair to declare a "Month of Microsoft Bugs" and then reveal bugs that Microsoft had nothing to do with?
Re: (Score:2)
While I agree that MOAB is not doing particularly well, VLC, Omniweb, and APE are all extremely common. The PDF bug is very dangerous, because PDF is so pervasive to the Aqua UI that almost any application could be the entry point.
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
The software has to be secure from top to bottom. If your PHP app has a security problem, it can do bad things on your machine no mather the OS.
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
Why not? It's Bills fault whenever a bug on WinTel platforms is found.
Re: (Score:2)
It sounds like it's written by a mildly clever hacker who is way, way too in love with himself, and has the emotional maturity of a ten year old.
It's hard to cut through all the
It's not an APE bug. (Score:2)
Re:Misleading Title - The bug is not in APE. (Score:2)
Better start looking for spyware in /Library (Score:3, Insightful)
Re: (Score:2)
You're interpreting 'holes' to mean specific vulnerabilities, where the GP would have reasonable grounds for claiming a 'hole' is any vector for exploitation.
Due to the deeply and intricately connected nature of Windows, there are legitimate arguments either way. A buffer-overrun in, say, the PNG codec is a single vulnerability, but there are lots of different attack vectors. One vector would be the web browser. Another would be the email client. A third would be any file that