Posted on 02/28/2006 6:57:54 PM PST by elfman2
In yesterday's article "Is Mac OS as safe as ever", Joris Evers poses the age old question if Mac OS security is myth or reality. I decided to settle this once and for all with some hard numbers from the independent security research group Secunia along with the number of CVE issues for Microsoft Windows XP and Mac OS X within the last two years.
Before I post the data, I want to make a few things clear since I keep getting the same questions and accusations every single time I post data on vulnerability statistics.
- When visiting the Secunia links I provide in this blog, please DO NOT quote me on the number of advisories for a particular OS and blast me for getting the numbers wrong. I am NOT counting advisories; I'm counting the actual number of vulnerabilities. There are many advisories that contain multiple vulnerabilities and CVE IDs. Sorry for the shouting, but I get about 10 of these "I don't count the same number of issues" every time.
- No matter what some people may say, vulnerability ratings from Secunia are a valid measurement of security risk. If we can't count the number of actual security vulnerabilities (with severity and patch status in mind), what can we count?
- There seems to be a cavalier attitude that a vulnerability is not a problem if it hasn't been widely hacked yet. The truth is that professional hackers don't want notoriety because it's bad for business. Before Microsoft's infamous WMF vulnerability was infamous because of all the press coverage, it sold on the black market for $4000. Nothing kills a money maker in the digital underworld faster than public exposure.
- There will always be those who say vulnerabilities are only "theoretical". Anyone who feels this way should leave their computers unpatched for all "theoretical" problems and post their email and IP address in talkback section and I'll be sure to forward a copy to the hacker forums. I'm sure it probably won't be a problem since the problem is only "theoretical".
- I make no claims on which operating system is better. You look at the data and you be the judge
- The three most severe levels of vulnerabilities from Secunia are analyzed in this chart.
- The two less critical categories from Secunia were left out so the significant data will fit better on the screen.
- The grayed out section represents the vendor with the worst security of the month.
- Red font text represents unpatched vulnerabilities correlating to the degree of vulnerability. For example in the month of February 2006, Apple's Meta data shell script execution flaw hasn't been fixed yet so it gets a red 1 in the extremely vulnerable column.
The data is clear, and Apple has a lot more vulnerabilities of every kind ranging from moderately critical to extremely critical. While Windows had some months with more security disclosures, they are more spread out while Apple tends to release mega-advisories with dozens of vulnerabilities at a time. There were seven months where Apple disclosed more a dozen or more highly critical vulnerabilities and August 2005 saw nearly three dozen of them. One of the most severe zero day exploits for Mac OS X disclosed this month with a working proof-of-concept has yet to be patched so we'll have to wait and see how long it takes Apple to release a patch.
Microsoft on the other hand seems to let some moderately critical and even one highly critical vulnerability go unpatched for more than a year. I've hammered Microsoft for this issue in the past and Microsoft has responded to me that they are clarifying some of these issues with Secunia because some of the unpatched vulnerabilities may be moot. I'm still waiting for Microsoft's detailed explanation on these unpatched vulnerabilities.
Secunia consistently exagerates the threat levels of minor security issues for the Mac... they have been roundly criticized for it in the past by other security companies.
How do you tell that Apple has done something that might capture more market share? The FUD articles start appearing!
|
secunia? Individuals still take them seriously? Go figure
I can't say this about PCs.
Secunia finds out about most of these because APPLE tells them because they are, for the most part, open source. How many things has Microsoft quietly patched and never mentioned, because they are considered "trade secrets."
Several times, when Secunia released its latest FUD, I have analyzed their exagerated "security levels" and found their hysteria totally unwaranted.
Anybody who says XP is more secure that OS X has been licking toads or getting a paycheck from Redmond.
Nevertheless, the majority of recent attacks require user permission to install. Look how many people installed the Sony virus. No OS can protect people from bad decisions.
The bad guys will forever be offering free stuff to children.
That is true.
Secunia followed Intego's lead when they claimed to have found the first "OS X Trojan" and trumpeted it while attempting to scare Mac users into buying their software. Secunia jumped on that bandwagon. All four of the "extremely critical" issues were related to that "trojan".
April 19, 2004 - Security experts on Friday slammed security firm Intego for exaggerating the threat of what the company identified as the first Trojan for Mac OS X.On Thursday, Intego issued a press release saying it had found OS X's first Trojan Horse, a piece of malware called MP3Concept or MP3Virus.Gen that appears to be an MP3 file. If double-clicked and launched in the Finder, the Trojan accesses certain system files, the company claimed.
While Intego said the Trojan was benign, it said future versions could be authored to delete files or hijack infected machines. In the release, and in subsequent telephone interviews, Intego was vague about the purported Trojan's workings and its origins.
On Friday, Mac programmers and security experts accused the company of exaggerating the threat to sell its security software.
"They gave the impression that this is a threat, but it isn't," said Dave Schroeder, a systems engineer with the University of Wisconsin. "It is a benign proof of concept that was posted to a newsgroup. It isn't in the wild, and can't be spread in the wild. It's a non-issue."
"They are spreading FUD to sell their software," said Ryan Kaldari, a programmer from Nashville, Tennessee, referring to the shorthand for fear, uncertainty and doubt.
So much for four of the five "extremely critical" vulnerabilities. Secunia has retained its hyperbolic rating... even though no one lost any sleep over the issue.
That has the looks of a great tagline!
Guess it will take teamwork LOL
I'm still waiting to hear what that "EXTREME" security problem is in February.... Nothing that I have heard would classify as "extreme"....
Whenever someone has to defend their sources with a statement like that, it's pretty obvious they have a weak argument.
I have spent the last four years conducting operational assessments of information assurance on fielded systems. The statistics to date:
Number of Windows boxes dropped: Several hundred thousand
Number of Linux boxes dropped: A few hundred
Number of Macintosh boxes dropped: Zero, zilch, nada
This in spite of the fact that Linux and Macintosh boxes each made up about 5% of the target population.
There are no publicly available exploits or tools to take down a Macintosh (or FreeBSD Unix) box.
There are no publicly available exploits or tools to take down some versions of Linux.
The BEST Intrusion Detection Systems detect have a probability of detection of about 20% against sophisticated threats.
The BEST Firewalls have a 10 - 20% probability of stoping a sophisticated attack.
Defense in depth and hybrid vigor are your friends.
Monocultures, whether it is all Cisco routers, or all Dell boxes, or identical versions of Windows XP with the latest patches installed are a hacker's playground.
Sleep well.
Yep. The proof is in the pudding. All these Secunia studies and stats are BLAH BLAH BLAH when it comes to real life experience.
Thank you. Your comments and several other on this thread are very helpful to me. Can you briefly list the primary ways to defeat 10% - 20% of the best firewalls or link to something not to in depth on it? Thanks.
I'll take a simple shot.
I believe it was the best firewalls only catch 10-20% of the attacks. I'm not sure exactly what they mean by it, but:
Easy attack, go around. Does the company have dial-in access to their network that doesn't go through the perimeter firewall? Hit that. Does the company allow people to connect outside with modems? Hit that when they dial up. Some malware (often found on web sites) dials your modem for you. My old organization ripped the modem out of every computer they could and the baseline disabled the modem service for machines with built-in modems.
Aside from that, if the firewall is in any way useful, the organization will have various ports open, such as if they're running IM or servers for email, Web, FTP, streaming media, etc. Since those ports are open, an attacker can get through to exploit the software on the other end using various methods to hide what he's actually doing.
At its basic level, think of a firewall as a gate where outside people wearing certain uniforms are always allowed in. That doesn't keep a bad guy from putting on a plumber's outfit to get in. But when you're protecting clients behind a firewall, it can say that a plumber can't get in unless he is identified as part of an existing request from the client ("stateful" firewall).
Like they say, "A firewall can protect against any kind of network attack if you unplug it."
I can totally attest to that one. An organization I was in had an automated baseline script that made a lot of security settings, including disabling modems and dangerous services (this was just before built-in wireless came out). We didn't allow auto-update or automatic patching, because our lab tested every Microsoft patch before releasing it to the organization. Many patches were found to re-enable what we'd disabled or change our security settings.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.