The macosxhints Forums

The macosxhints Forums (http://hintsforums.macworld.com/index.php)
-   The Coat Room (http://hintsforums.macworld.com/forumdisplay.php?f=8)
-   -   Safari hacked to root machine (http://hintsforums.macworld.com/showthread.php?t=71263)

biovizier 04-26-2007 04:01 PM

But if you read further down in the interview you linked to, Dino Dai Zovi is quoted as saying
Quote:

There was very little user action involved. Once the browser opened to a Web page that the attacker controlled, it was game over.
http://blogs.zdnet.com/security/?p=176

But still it's all speculation at this stage. I personally will be erring on the side of caution.

cwtnospam 04-26-2007 04:12 PM

Yes, I saw that but after saying what he already had, it seems like he was trying to minimize the user's actions to make the hack appear to be more than it was, which was enough to win the contest within its rules, but probably not much more.

I'd like to see this hack tested by sending the link to a computer not touched by anyone trying to hack it. An impartial 'judge' would click the link and do no more. If it works under those circumstances, then I'd believe it.

hayne 04-26-2007 04:20 PM

It is clearly stated that the contest is only open to attendees of the conference. What I am guessing that means is that the Mac in question was not accessible via the wide Internet but was only accessible via the local area network of the conference. Hence the malicious web site was running on one of the attendees machines that was physically present at the conference. So what Shane needed to do was to set up the web site and perhaps to manually react when the web site was visited. Shane did not need to do anything on the Mac in question - all that was required was that the organizers visited the supplied URL on that Mac.

tlarkin 04-26-2007 04:25 PM

Quote:

Originally Posted by cwtnospam (Post 374947)
Yes, I saw that but after saying what he already had, it seems like he was trying to minimize the user's actions to make the hack appear to be more than it was, which was enough to win the contest within its rules, but probably not much more.

I'd like to see this hack tested by sending the link to a computer not touched by anyone trying to hack it. An impartial 'judge' would click the link and do no more. If it works under those circumstances, then I'd believe it.

In all honesty it is not that unbelievable, the sole purpose of a web browser is to send and receive requests over the internet/network. If this exploit was done through java and the browser had java enabled, and all that was needed was a visit, then boom your rooted/infected/whatever seems possible to me.

I mean how does safari initially react to java applets, scripts, and the like when hitting a web page?

cwtnospam 04-26-2007 05:37 PM

By itself it is very believable. In the context of a contest that was set up from the begining to find a winner by relaxing the rules over the course of the contest, it's suspect. Just how much did they relax the rules? Nobody seems to know, which makes me more suspicious.

Hal Itosis 04-26-2007 10:30 PM

Quote:

Originally Posted by cwtnospam (Post 374947)
Yes, I saw that but after saying what he already had, it seems like he was trying to minimize the user's actions to make the hack appear to be more than it was, which was enough to win the contest within its rules, but probably not much more.

You think... $10,000 for a gag... something Mac users will simply laugh at later?
Sounds like a stretch. How do you figure that one? [explain]


Quote:

Originally Posted by cwtnospam (Post 374947)
I'd like to see this hack tested by sending the link to a computer not touched by anyone trying to hack it. An impartial 'judge' would click the link and do no more. If it works under those circumstances, then I'd believe it.

Do you know anything about shell scripts?

Do you actually believe there's something a human can do (in this context)
that a script can't do a *million* times faster. What could that be I wonder?
I don't see what more anyone here can say that hasn't been said already.

Anyway, I saw reference to a line saying the objective was to get a "shell".

So the person doing the typing was playing the hacker's role, typing as he
wreaked havoc on the remote Mac. (I already said as much... but it seems
you conveniently ignored that explanation). How do we know YOU'RE real?

:p

hayne 04-26-2007 11:24 PM

As I pointed out above, this whole affair has been very badly reported. And cwtnospam has been confused by the reporting about what Shane did.

Quote:

Originally Posted by cwtnospam
Can someone explain why it is that the hack is able to take over the machine, yet requires the user to 1) connect to the shell and 2) follow instructions (plural) to succeed? That just doesn't seem like a "drive-by" to me.

Here's what happened as far as I can piece it together.
There are two machines on a local wireless network:
Machine A is the Mac that is the target of the attack. Machine A is in the possession of the conference organizers and is not physically accessible to anyone else.
Machine B is some other arbitrary machine that Shane Macaulay has in his possession. (There is no requirement that this machine is a Mac.)

Dino Dai Zovi communicated his idea for the exploit to Shane Macaulay. He gave step by step instructions to Shane on how to set up the malicious web site on Machine B and then what to do once the attack was triggered (via the specified URL).

Shane told the organizers the URL for the malicious web site and the organizers used Safari on Machine A to go to that URL.
This provided shell access on Machine A to Shane who was on Machine B.

Hal Itosis 04-27-2007 12:15 AM

Quote:

Originally Posted by cwtnospam (Post 374959)
By itself it is very believable. In the context of a contest that was set up from the begining to find a winner by relaxing the rules over the course of the contest, it's suspect. Just how much did they relax the rules? Nobody seems to know, which makes me more suspicious.

www.securityfocus.com/archive/142/464216/30/0/threaded

There's the 'progressive' rules part.
[move up to read the whole thread]

cwtnospam 04-27-2007 12:21 AM

Quote:

Originally Posted by Hal Itosis (Post 375025)
Do you know anything about shell scripts?

Do you actually believe there's something a human can do (in this context)
that a script can't do a *million* times faster. What could that be I wonder?

I don't know anything about the shell he connected to, or even if he connected to it without first physically accessing the test computer, so I don't know what could be accomplished in it. I do believe that there are many things a user with physical access to the computer might be able to do that the shell might not.

Once again, I'm not saying that he didn't succeed according to the rules of the contest. I'd just like to know exactly how far those rules were relaxed. I guess I trust this Dino guy more than I do the organizers of the event, who are after all part of the same 'security' industry that's been doing everything it can to scare Mac users into using AV software for years.

cwtnospam 04-27-2007 12:27 AM

Quote:

Originally Posted by Hal Itosis (Post 375036)
www.securityfocus.com/archive/142/464216/30/0/threaded

There's the 'progressive' rules part.
[move up to read the whole thread]

Hmmm, I must have been typing my previous post while you were posting this one. I guess that answers my question then.

Hal Itosis 04-27-2007 02:00 AM

As long as we got this far, there are a pair of articles at roughlydrafted,
one at arstechnica, two (so far) at rixstep... one of which leads to these:

http://security-protocols.com/sp-x45-advisory.php
http://security-protocols.com/sp-x46-advisory.php

Apparently two flaws reported by one Tom Ferris, first one over a year old.

[Not sure they're what was used the other day, but it seems to be implied]

--

Admittedly: it's not too likely anyone will actually run across an
example of this... and (by itself!) root was never attained... and
(by itself!) it contains no worm characteristics... so we don't need
any tin foil hats.

But neither should we take away from it that which it does deserve.

At this point, it must get patched... or it would be the the beginning
of much bigger headaches. No doubt.

biovizier 05-01-2007 04:45 PM

Check your "Software Update" - "Security Update 2007-004 v1.1" and "QuickTime 7.6.1" are up...

Edit:
Just to clarify, the QuickTime update addresses the vulnerability that is the topic of this thread.
The security update is for something else.

tlarkin 05-01-2007 04:52 PM

so I am confused still, so the media just basically reported this it a totally FUBAR'd way?

So, did the guy really get the 10,000 dollars (haha reminds me of the simpsons when they had that film festival!)??????

Craig R. Arko 05-01-2007 05:48 PM

Quote:

Originally Posted by biovizier (Post 376086)
Check your "Software Update" - "Security Update 2007-004 v1.1" and "QuickTime 7.6.1" are up...

Well, one consequence of the QuickTime update appears to be killing a class of animated ads, including the ones we display here. They must have depended on some QTforJava 'feature' that was changed in closing the security hole. Or maybe the Flash plugin used it?

cwtnospam 05-01-2007 06:12 PM

They must not be in the audible.com ad, because I see the animation in that.

Craig R. Arko 05-01-2007 06:15 PM

All I see is the QuickTime logo with a question mark through it. The Apple site, by comparison, behaves normally.

This is in Safari, by the way. I have not tried other browsers yet.

cwtnospam 05-01-2007 08:19 PM

Have you changed your Quicktime settings? Maybe turned off Java? I'm using Safari, I've applied the patch, and I see the ad.

Craig R. Arko 05-01-2007 08:57 PM

Hadn't changed them lately, but I fixed this display problem by going into the QuickTime prefpanel and under Advanced->Mime Settings->Miscellaneous telling QuickTime to not handle Flash media. I must have set that at some point. Now, all is back to normal.


All times are GMT -5. The time now is 03:10 AM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.