Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Two zero-day Safari exploits found, one allowing complete takeover of Mac
9 to 5 Mac ^ | Mar. 21st 2019 6:44 am PT | Ben Lovejoy

Posted on 03/21/2019 10:57:40 AM PDT by Swordmaker


White-hat hackers at a security conference in Vancouver have found two zero-day Safari exploits, one of which allowed them to escalate their privileges to the point that they were able to completely take over the Mac …

The first exploit managed to escape the sandbox, a protection macOS uses to ensure that apps only have access to their own data, and any system data permitted by Apple.

The contest started with the team of Fluoroacetate (Amat Cama and Richard Zhu) targeting the Apple Safari web browser. They successfully exploited the browser and escaped the sandbox by using an integer overflow in the browser and a heap overflow to escape the sandbox. The attempt nearly took the entire allowed time because they used a brute force technique during the sandbox escape. The code would fail then try again until it succeeded. The demonstration earned them $55,000 USD and 5 points towards Master of Pwn.

The second got rather further, gaining both root and kernel access to the Mac.

The final entry in Day One saw the phoenhex & qwerty team (@_niklasb @qwertyoruiopz and @bkth_) targeting Apple Safari with a kernel elevation. They demonstrated a complete system compromise. By browsing to their website, they triggered a JIT bug followed by a heap out-of-bounds (OOB) read – used twice – then pivoted from root to kernel via a Time-of-Check-Time-of-Use (TOCTOU) bug. Unfortunately, it was only a partial win since Apple already know of one of the bugs used in the demo. Still, they earned themselves $45,000 USD and 4 points towards Master of Pwn.ZDI

Safari is a common access point for hackers. Last year’s conference saw one zero-day Safari exploit used to take control of the Touch Bar on the MacBook Pro, with three more Safari-based exploits demonstrated the following day.

The event was hosted by Trend Micro under the branding of its Zero Day Initiative (ZDI). The program was created to encourage hackers to privately report vulnerabilities to the companies concerned rather than sell them to bad actors. ZDI does this by offering financial rewards and kudos.

Interested researchers provide us with exclusive information about previously un-patched vulnerabilities they have discovered. The ZDI then collects background information in order to validate the identity of the researcher strictly for ethical and financial oversight. Our internal researchers and analysts validate the issue in our security labs and make a monetary offer to the researcher. If the researcher accepts the offer, a payment will be promptly made. As a researcher discovers and provides additional vulnerability research, bonuses and rewards can increase through a loyalty program similar to a frequent flier program.

Trend Micro uses the vulnerability information to create protection for its customers, while simultaneously notifying the vendor – in this case Apple – so that they can fix the problem.

ZDI paid out a total of $240k on the first day.

As per its usual practice, ZDI will not release detailed information on the exploits until Apple has confirmed that it has fixed them in a macOS update.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applepinglist; safari; security; whitehat

1 posted on 03/21/2019 10:57:40 AM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; AFreeBird; ...
White Hat hackers at contest find and report to Apple five zero day Safari vulnerabilities. The hackers were awarded bounties by Trend Micro and "Atta-boys" kudos for their efforts. Finding such vulnerabilities is a benefit to all. . . —PING!


Safari Security Vulnerability Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 03/21/2019 11:02:24 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
The Beach Boys ~ Surfin' Safari (1962)

The Beach Boys ~ Surfin' Safari (1962)

3 posted on 03/21/2019 11:32:08 AM PDT by SunkenCiv (this tagline space is now available)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Any recommendations on a program for protecting a Mac ... generally? I have the MacBook Air (the new one) and then I’m getting a new iMac soon. Just wondering if there is any one program that is better than the others in protecting the Mac.

Nice to get back here again, with other Macintosh users. I’ve been away from Free Republic for quite a while. Glad you’re still ‘at it’ with Macintosh ... Swordmaker!


4 posted on 03/21/2019 11:33:17 AM PDT by Star Traveler (Remember to keep the Messiah of Israel in the One-World Government that we look forward to coming)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Star Traveler

Nice to see you back Star Traveler.


5 posted on 03/21/2019 11:51:02 AM PDT by aMorePerfectUnion
[ Post Reply | Private Reply | To 4 | View Replies]

To: Star Traveler

Like any computer, lock it in a closet and throw away the key.


6 posted on 03/21/2019 12:02:35 PM PDT by ImJustAnotherOkie (All I know is what I read in the papers.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Star Traveler

Welcome back. . . The advice is still to let the OS do it. Occasionally run a free version of Mac version of Malwarebytes to see if any Windows stuff might be lurking around you could be sending out.


7 posted on 03/21/2019 12:03:12 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker

This crap will never end.


8 posted on 03/21/2019 12:03:28 PM PDT by ImJustAnotherOkie (All I know is what I read in the papers.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

System exploits and Mohammedan Madness. Examples of the neverending story.


9 posted on 03/21/2019 12:15:46 PM PDT by chulaivn66 (No. Your move.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: ImJustAnotherOkie

There are always exploits. That is the whole point of white hat activities like this contest. Nothing to see here.


10 posted on 03/21/2019 12:20:00 PM PDT by TalonDJ
[ Post Reply | Private Reply | To 8 | View Replies]

To: ImJustAnotherOkie; Swordmaker
"Like any computer, lock it in a closet and throw away the key."

Better make sure that closet doesn't have a back door.

_____________________________________________________

Another good example of security just being an illusion, eh Swordie?


11 posted on 03/21/2019 1:47:59 PM PDT by Garth Tater (What's mine is mine.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker

Thanks ... and I’ll check that out.


12 posted on 03/21/2019 2:37:51 PM PDT by Star Traveler (Remember to keep the Messiah of Israel in the One-World Government that we look forward to coming)
[ Post Reply | Private Reply | To 7 | View Replies]

To: ImJustAnotherOkie

LOL ...


13 posted on 03/21/2019 2:38:43 PM PDT by Star Traveler (Remember to keep the Messiah of Israel in the One-World Government that we look forward to coming)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker

What do you think of the Epic browser on the Mac?
I’ve been using it a little.


14 posted on 03/21/2019 2:46:51 PM PDT by BTerclinger (MAGA)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BTerclinger
What do you think of the Epic browser on the Mac?
I’ve been using it a little.

It looks like a good privacy priority alternative browser to me. Don’t use it to log into gmail, per Epic’s own advice.

15 posted on 03/21/2019 3:35:41 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Swordmaker

True or false - these “hacks” required physical access to the computer in question? Or does it require tricking a user (running an account with admin privileges) into clicking a link to a nefarious web page?


16 posted on 03/21/2019 11:20:49 PM PDT by TheBattman (Democrats-Progressives-Marxists-Socialists - redundant labels.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Thank you!


17 posted on 03/22/2019 10:25:13 AM PDT by BTerclinger (MAGA)
[ Post Reply | Private Reply | To 15 | View Replies]

To: TheBattman
True or false - these “hacks” required physical access to the computer in question? Or does it require tricking a user (running an account with admin privileges) into clicking a link to a nefarious web page?

True and true.

18 posted on 03/22/2019 10:27:19 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 16 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson