Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Snow Leopard less secure than Windows, says hacker
TechWorld ^ | 09/15/2009 | Gregg Keizer

Posted on 09/17/2009 7:59:21 AM PDT by BubbaBasher

Snow Leopard lacks security features that are built in to Windows XP, Windows Vista and Windows 7, a noted Mac researcher has said.

Dubbed ASLR, for address space layout randomisation, the technology randomly assigns data to memory to make it tougher for attackers to determine the location of critical operating system functions, and thus make it harder for them to craft reliable exploits.

"Apple didn't change anything," said Charlie Miller, of Baltimore-based Independent Security Evaluators, the co-author of The Mac Hacker's Handbook, and winner of two consecutive "Pwn2own" hacker contests. "It's the exact same ASLR as in Leopard, which means it's not very good."

Two years ago, Miller and other researchers criticised Apple for releasing Mac OS X 10.5, aka Leopard, with half-baked ASLR that failed to randomise important components of the OS, including the heap, the stack and the dynamic linker, the part of Leopard that links multiple shared libraries for an executable.

Miller was disappointed that Apple didn't improve ASLR from Leopard to Snow Leopard. "I hoped Snow Leopard would do full ASLR, but it doesn't," said Miller. "I don't understand why they didn't. But Apple missed an opportunity with Snow Leopard."

Even so, Miller said, Apple made several moves that did improve Mac OS X 10.6's security. Two that stand out, he said, were its revamp of QuickTime and additions to DEP (data execution prevention), another security feature used in Windows Vista.

"Apple rewrote a bunch of QuickTime," said Miller, "which was really smart, since it's been the source of lots of bugs in the past." That's not surprising, since QuickTime supports scores of file formats, historically its weak link. Last week, in fact, Apple patched four critical QuickTime vulnerabilities in the program's parsing of various file formats.

How Apple's rewrite of QuickTime for Snow Leopard plays out, of course, is uncertain, but Miller was optimistic. An exploit of a vulnerability in Leopard's QuickTime that he had been saving doesn't work in the version included with Snow Leopard, Miller acknowledged.

"They've shaken out hundreds of bugs in QuickTime over the years, but it was still really smart of them to rewrite it," said Miller. If it was up to him, though, Miller would do even more. "I'd reduce the number of file formats from 200 or so to 50, and reduce the attack surface. I don't think anyone would miss them."

Snow Leopard's other major security improvement was in DEP, which Miller said has been significantly enhanced. DEP is designed to stop some kinds of exploits - buffer overflow attacks, primarily - by blocking code from executing in memory that's supposed to contain only data. Microsoft introduced DEP in Windows XP Service Pack 2 (SP2), and expanded it for Vista and the upcoming Windows 7.

Put ASLR and DEP in an operating system, Miller argued, and it's much more difficult for hackers to create working attack code. "If you don't have either, or just one of the two [ASLR or DEP], you can still exploit bugs, but with both, it's much, much harder."

Because Snow Leopard lacks fully-functional ASLR, Macs are still easier to compromise than Windows Vista systems, Miller said. "Snow Leopard's more secure than Leopard, but it's not as secure as Vista or Windows 7," he said. "When Apple has both [in place], that's when I'll stop complaining about Apple's security."

In the end, though, hacker disinterest in Mac OS X has more to do with numbers, as in market share, than in what protective measure Apple adds to the OS. "It's harder to write exploits for Windows than the Mac," Miller said, "but all you see are Windows exploits. That's because if [the hacker] can hit 90% of the machines out there, that's all he's gonna do. It's not worth him nearly doubling his work just to get that last 10%."

Mac users have long relied on that "security-through-obscurity" model to evade attack, and it's still working. "I still think you're pretty safe [on a Mac]," Miller said. "I wouldn't recommend antivirus on the Mac."

But the missed opportunity continues to bother him. "ASLR and DEP are very important," Miller said. "I just don't understand why they didn't do ASLR right," especially, he added, since Apple touted Snow Leopard as a performance and reliability update to Leopard.

"If someone else is running your machine, it's more unreliable than if you're running it," Miller concluded.


TOPICS: Computers/Internet; Science
KEYWORDS: hacker; security; snowleopard; windows
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061 next last
To: BubbaBasher
> For all those that want to know: I got everything from www.newegg.com...

VERY nice list of stuff. Great price too. Newegg rocks, I buy a lot of stuff through them, never been burned.

I presume you're a serious gamer -- that sort of firepower is wasted on any lesser activity.

Also, congrats on a successful thread hijack -- of course, it's your own thread, so I'm not complaining, mind you. ;-)

21 posted on 09/17/2009 10:06:17 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 20 | View Replies]

To: BubbaBasher
This CPU will easily overclock to 4 Ghz.

I have found it not so easy to overclock it. I must be doing it incorrectly. Do you know the right way to do it?

22 posted on 09/17/2009 10:08:57 AM PDT by krb (Obama is a miserable failure.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: dayglored
Didn’t Miller need root access in order to crack the Mac ?

23 posted on 09/17/2009 10:14:40 AM PDT by Uri’el-2012 (Psalm 119:174 I long for Your salvation, YHvH, Your law is my delight.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: krb
The CPU I bought is a "Black Edition" so all of the timings and settings are unlocked from the factory. The motherboard I bought supports all the changes. I won't go for 4ghz until I upgrade the CPU cooler. Check out www.overclockercafe.com
24 posted on 09/17/2009 10:19:38 AM PDT by BubbaBasher ("Liberty will not long survive the total extinction of morals" - Sam Adams)
[ Post Reply | Private Reply | To 22 | View Replies]

To: UriÂ’el-2012; ShadowAce; Swordmaker
> Didn’t Miller need root access in order to crack the Mac ?

That's what I meant by "already-compromised".

Requiring root access for a hack to work is like saying you can hack a Linux box by booting up a recovery CD and reading/writing the Linux hard drive. D-uh, so what? Getting root, or getting physical access to the machine, is the hard part.

Windows apologists will go to any length to find a weakness in OS-X or Linux, even if it's not something that can be exercised in any practical sense.

Microsoft is on tenterhooks to see how well Win7 does. If it fails they are toast. I like Win7, and I don't think it will fail, but it has yet to be released to a skeptical world. The residue of Vista still clings to the wheels.

Since this thread seems a ready target for hijacking, have you heard about the Microsoft-sponsored Win7 Tupperware Parties? Read up: They're a riot.

Desperation has a smell, and it's all over this article. ;-)

25 posted on 09/17/2009 10:31:36 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 23 | View Replies]

To: dayglored; ShadowAce; Swordmaker
Microsoft-sponsored Win7 Tupperware Parties?

ROTFLOL !

26 posted on 09/17/2009 10:36:05 AM PDT by Uri’el-2012 (Psalm 119:174 I long for Your salvation, YHvH, Your law is my delight.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: dayglored; ShadowAce

Thanks guys, now downloaded and off to work I go!


27 posted on 09/17/2009 10:41:28 AM PDT by investigateworld (Abortion stops a beating heart)
[ Post Reply | Private Reply | To 19 | View Replies]

To: dayglored
It's not misleading at all.

With Apples increased market share, the virus business will shift from PC to Mac as more are online. It's a simple numbers game, and PC'rs have been making this claim since the first virus.

Just a matter of time. And yes, with the introduction of VISTA and now Win7, the built in security has really improved bigtime.

I've often thought about taking my AV program offline as it is not necessary, but should I load a virus, even though it has been rendered useless, I still want a way to manually quarantine it.

28 posted on 09/17/2009 10:42:37 AM PDT by Cold Heat
[ Post Reply | Private Reply | To 3 | View Replies]

To: investigateworld
Of course you could have just used WordPad. ;-)

Personally I would have used "edlin".

29 posted on 09/17/2009 10:44:37 AM PDT by BubbaBasher ("Liberty will not long survive the total extinction of morals" - Sam Adams)
[ Post Reply | Private Reply | To 27 | View Replies]

To: dayglored

You are right. And from what I read the hacks in created very small problems that unless you were really lookign for them most people would never notice. No missing files, not crashed computer, etc...Very predicable tht they will run out the same stories over and over right before a new windows OS appears? Is propaganda that easy to pass around?


30 posted on 09/17/2009 10:56:43 AM PDT by chris_bdba
[ Post Reply | Private Reply | To 7 | View Replies]

To: krb
Forget about overclockcafe. Just a bunch of old stuff. Here's a link specific to what you are looking for. www.overclock.net
31 posted on 09/17/2009 11:05:31 AM PDT by BubbaBasher ("Liberty will not long survive the total extinction of morals" - Sam Adams)
[ Post Reply | Private Reply | To 22 | View Replies]

To: BubbaBasher

Thanks! I can’t wait to get it working :-)


32 posted on 09/17/2009 11:13:44 AM PDT by krb (Obama is a miserable failure.)
[ Post Reply | Private Reply | To 31 | View Replies]

To: Cold Heat
> ...with the introduction of VISTA and now Win7, the built in security has really improved bigtime.

No argument. But still way behind an operating system that was designed with security in mind, instead of merely bolted on haphazardly afterward.

> With Apples increased market share, the virus business will shift from PC to Mac as more are online. It's a simple numbers game, and PC'rs have been making this claim since the first virus.

Okay, name the number. What's the number?

If not 35,000,000+ unprotected, non-techie-operated, run-with-admin-priv, ZERO anti-virus software machines is not enough to tempt the virus writers, what's the magic number when Macs become a target?

If you shoot too high, you're admitting that Macs will be non-targets (and thus "safe") essentially forever.

If you shoot too low, you'll have to watch the number of Macs exceed it without becoming targets (if I'm right).

So what's the number?

33 posted on 09/17/2009 11:38:29 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 28 | View Replies]

To: dayglored
I'll know the number when I hear the squealing.
34 posted on 09/17/2009 11:40:56 AM PDT by Cold Heat
[ Post Reply | Private Reply | To 33 | View Replies]

To: Cold Heat
> I'll know the number when I hear the squealing.

Sure, sure. Hey, don't feel bad, none of the apologists who push that "35 million isn't tempting enough" line are willing to name a number that is.

There will always be some excuse. ;-)

I'm willing to bet Apple will never get enough marketshare that the Mac "becomes a target" based on numbers. The Mac will only become a target if Apple drops their pants on security in a big way, and creates a target. I don't expect that to happen, since they, like Microsoft, are always improving.

They could blow it with a non-Unix product, of course...

35 posted on 09/17/2009 12:04:28 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 34 | View Replies]

To: dayglored
No argument. But still way behind an operating system that was designed with security in mind, instead of merely bolted on haphazardly afterward.

I agree with some of your conclusions but this statement is incorrect. Security was a major consideration and designed into Windows starting with Windows NT. Government and Military sales forced the need to move to a new codebase after Win95/98. And actually the NT kernel pretty much came from OS/2 where security was also a focus.

36 posted on 09/17/2009 12:08:36 PM PDT by BubbaBasher ("Liberty will not long survive the total extinction of morals" - Sam Adams)
[ Post Reply | Private Reply | To 33 | View Replies]

To: BubbaBasher
>> ...still way behind an operating system that was designed with security in mind, instead of merely bolted on haphazardly afterward.

> I agree with some of your conclusions but this statement is incorrect. Security was a major consideration and designed into Windows starting with Windows NT. Government and Military sales forced the need to move to a new codebase after Win95/98. And actually the NT kernel pretty much came from OS/2 where security was also a focus.

Hmmm, ok. Let me modify/clarify my statement. "Bolted on haphazardly afterward" -is- a little harsh these days, although it's not inaccurate for NT's first decade through about 2004 (specifically the release of XP-SP2, which was the first significant improvement).

NT was required because DOS-based Windows could never become a server, never be secure, never be taken seriously. We agree on that.

However, NT has suffered since the beginning until today (NT6.1=Win7) with the burden of having to support architectural weaknesses that are part-and-parcel of the Windows way of doing things. That is, a "Wow, we could do this and it would be way cool!" approach to design, as opposed to a "We could do this, but what problems does it raise?" approach.

For example, there is no other explanation for why, only after all these years, Microsoft is FINALLY admitting that AutoPlay/AutoRun is a stupid design flaw, not a feature. And even now, when they have started disabling it, they only disable it for some things like USB drives, but not for CDs -- even though USB Flash products with "U3" software present themselves as CDs and circumvent the disable. This is a sign of POOR DESIGN.

If you read the Microsoft and MSDN KB articles about these things, you realize that Windows is hobbled, even crippled, by stupid design decisions that can't be fixed, largely because no one understands what else will break if they fix the item in question.

So let me try this: In an environment like Windows, real "security" -- the kind that comes from inherently good design -- is much more difficult, and sometimes impossible without total rewrite. It is, in my opinion, a testament to the outstanding abilities of Microsoft's programmers that they've been able to do as much as they have done to improve Windows in the past five years, and maintain the level of back-compatibility they still have.

Windows NT codebase has been overdue for a total rewrite for many years. When it happens, I and many others will be very happy, because then and only then will Windows have a shot at the kind of security that Unix folks have had for a long time.

37 posted on 09/17/2009 1:12:34 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 36 | View Replies]

To: ~Kim4VRWC's~; 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; Aliska; aristotleman; ...
Charlie Miller is back on his attention seeking soapbox about Mac OSX Security and the lack of system wide Windows Vista like ASLR approach to assuring it, ignoring the steps that Apple HAS taken that accomplish the same level of security with out the performance hit that ASLR requires. PING!


Mac Pre Windows 7 FUD Ping!

If you want on or off the Mac Ping List, Freepmail me.

38 posted on 09/17/2009 2:19:25 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: BubbaBasher
Put ASLR and DEP in an operating system, Miller argued, and it's much more difficult for hackers to create working attack code. "If you don't have either, or just one of the two [ASLR or DEP], you can still exploit bugs, but with both, it's much, much harder."

The presence of ASLR and DEP on Windows XP, Vista, and 7 machines has not stopped the proliferation of viruses, spyware, trojans, and other assorted malware. In fact, proliferation is at an all-time high.

FUD article.
39 posted on 09/17/2009 2:23:47 PM PDT by Terpfen (FR is being Alinskied. Remember, you only take flak when you're over the target.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BubbaBasher

Full of FUD, but I was a bit dissapointed that Snow Leopard didn’t use ASLR.

However, ASLR is only one bit on the back end to reduce the possibility of a successful intrusion being able to do its work. Attacks are just plain harder in the first place with OS X.

IOW, ASLR would have just been icing on the cake for OS X, while it was sorely needed by Windows.


40 posted on 09/17/2009 2:29:41 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson