[Infowarrior] - Apple sits on critical Mac bug for 7 months (and counting)
Richard Forno
rforno at infowarrior.org
Tue Jan 12 03:40:19 UTC 2010
Apple sits on critical Mac bug for 7 months (and counting)
Unix flaw fixed in OpenBSD, not OS X
By Dan Goodin in San Francisco • Get more from this author
Posted in Security, 12th January 2010 00:14 GMT
http://www.theregister.co.uk/2010/01/12/critical_osx_security_bug/
Researchers have disclosed a critical vulnerability in the latest
version of Mac OS X that they say Apple has sat on for almost seven
months without fixing.
The buffer overflow flaw could be exploited by attackers to remotely
execute malicious code, and virtually all Apple devices - including
Mac computers and servers, iPhones, and even Apple TV - are
susceptible, one of the researchers, Maksymilian Arciemowicz, told The
Register. SecurityReason.com, the Poland-based security firm he works
for, alerted Apple to the vulnerability in the middle of June and
again last month, but the computer maker has yet to patch the bug.
By contrast, developers for OpenBSD, NetBSD, FreeBSD, and a variety of
Mozilla applications have fixed identical vulnerabilities, in some
cases within hours of notification. The bug affects all applications
and operating systems that implement gdtoa floating point numbers.
"It was not that difficult to patch it," Arciemowicz wrote in an
email. "It seems to us that Apple comes from the assumption that when
there is no PoC or exploit given that the problem doesn't exist."
The OS X bug resides in the libc/strtod(3) and libc/gdtoa function.
Arciemowicz said the vulnerability could be remotely exploited using
booby-trapped PHP code on a website, among other methods.
SecurityReason has posted proof-of-concept code here that shows how
the flaw can be exploited to make a machine crash. With additional
work - specifically, by manipulating esi and edi registers - it is
possible to remotely execute code, Arciemowicz said.
Of the 16 applications or systems known to be affected by the bug,
only four remain vulnerable. In addition to OS X, they include Mozilla
Sunbird, K-Meleon, and the J programming language. ®
More information about the Infowarrior
mailing list