Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Contest winner: Vista more secure than Mac OS
Mac World ^ | May 01, 2007 | Gregg Keizer

Posted on 04/30/2007 8:27:38 PM PDT by jdm

Dino Dai Zovi, the New York-based security researcher who took home $10,000 in a highly-publicized MacBook Pro hijack on April 20, has been at the center of a week’s worth of controversy about the security of Apple’s operating system. In an e-mail interview with Computerworld, Dai Zovi talked about how finding vulnerabilities is like fishing, the chances that someone else will stumble on the still-unpatched bug, and what operating system — Windows Vista or Mac OS X — is the sturdiest when it comes to security.

Friday, the vulnerability was first identified as within Safari, but by Monday, QuickTime was tagged. Why the confusion?

I knew exactly where the vulnerability was when I wrote the exploit; that is part of the basic vulnerability research usually required to write a reliable exploit. I intentionally did not reveal where exactly the vulnerability was in order to prevent others from reverse engineering the vulnerability from those details. Initially, I was only revealing that the vulnerability affected Safari on Mac OS X, the target of the contest. However, now ZDI [3com TippingPoint’s Zero Day Initiative] has been willing to publicly reveal that it affects many more system configurations, including all Java-enabled browsers on Mac OS X and Windows if QuickTime is installed.

As you were working with the vulnerability and exploit, did you know that it would impact non-Mac OS X systems?

I had suspected that it might affect other platforms running QuickTime, but I did not have time to look into it.

You found the vulnerability and crafted an exploit within 9 or 10 hours. And you’ve said ‘there was blood in the water.’ Does that mean you had a head start — in other words, prior research — or was it all built from scratch? Is it really that easy to dig up a vulnerability?

I had found other vulnerabilities in Mac OS X and even QuickTime in the past, so I had some familiarity with the code, but I only discovered this vulnerability that night. My quote that there was “blood in the water” referred to the fact that there were reports of other vulnerabilities in QuickTime, and even Java-related vulnerabilities in QuickTime over the last few years. In my experience, if a certain software package has had vulnerabilities in the past, it is more likely to contain other undiscovered vulnerabilities.

Halvar Flake and Dave Aitel, two prominent security researchers, use the fishing metaphor to explain vulnerability finding. Some days you go out and catch nothing, some days you catch something great. Sometimes you hear about some great fishing happening in a stream somewhere and there are lots of fish to catch until everyone else starts fishing there and the stream becomes overfished. In this case, I suspected that there would be good fishing in QuickTime and I got lucky and found something good in a short amount of time. This is far from the first time that I’ve gone fishing for vulnerabilities, however.

After the positive ID of the vulnerability, there were some unconfirmed claims that your exploit had been snatched at CanSecWest. Although those reports have been discounted, what can you tell us about how you protect your findings? And what are the chances that someone will independently dig out the vulnerability based on the limited information made public?

I do everything that I consider reasonable to protect my security research. I keep exploits in encrypted disk images that are only mounted when necessary on hardened systems that are not always powered on. I am very conservative in what details I share and with whom in order to tightly control knowledge of the vulnerabilities. I often give my exploits non-obvious code names so that I can refer to them over non-encrypted channels without revealing anything about them. [But] with the details that have been released so far, I believe that is a very real possibility that someone may be able to independently dig out the vulnerability, but it won’t exactly be trivial and I hope that whoever does acts responsibly with it.

With the ongoing ‘Mac OS X is safe’ vs. ‘You’re in denial’ debate, what would you recommend to a Mac user as reasonable security precautions?

I recommend that Mac users make their primary user a non-admin account, use a separate keychain for important passwords, and store sensitive documents in a separate encrypted disk image. I think these are fairly straightforward steps that many users can take to better protect their sensitive information on their computer.

As a researcher who works often in Mac OS X, what’s your take on the amount of information that Apple releases when it patches vulnerabilities?

I think that the amount of information that Apple releases with its patches is sufficient in the level of detail for a knowledgeable user to determine the criticality of the vulnerabilities. They do not, however, provide guidance on the level of criticality of the security update for less technical users. I do not think this is too much of an issue, though, as I believe that the vast majority of users should simply patch the security vulnerabilities as soon as possible regardless of their criticality.

How important in this case was it that 3com TippingPoint stepped up with a $10,000 prize? Would you have bothered if the prize money had not been there?

For me the challenge, especially with the time constraint, was the real draw. I also hoped that the live demonstration of a Mac OS X exploit would provide some much needed hard evidence in the recent Mac security debates.

From your research on both platforms, is there a winner between Mac OS X 10.4 and Vista on security?

I have found the code quality, at least in terms of security, to be much better overall in Vista than Mac OS X 10.4. It is obvious from observing affected components in security patches that Microsoft’s Security Development Lifecycle (SDL) has resulted in fewer vulnerabilities in newly-written code. I hope that more software vendors follow their lead in developing proactive software security development methodologies.

What are you spending most of your time on these days? Last October, for instance, there were news stories that mentioned you showed a VM rootkit to developers at Microsoft.

I recently co-authored a book, The Art of Software Security Testing: Identifying Software Security Flaws, which was just published by Addison-Wesley Professional in December. Also since around that time, I have been managing information security for a financial firm in New York City. I do still spend some of my free time researching software vulnerabilities, VM hypervisor rootkits, and 802.11 wireless client security.


TOPICS: Business/Economy; Culture/Society; Miscellaneous; News/Current Events
KEYWORDS: apple; mac; macos10; macosx; microsoft; security; vista
Navigation: use the links below to view more comments.
first 1-2021-4041-53 next last

1 posted on 04/30/2007 8:27:43 PM PDT by jdm
[ Post Reply | Private Reply | View Replies]

To: ShadowAce; Swordmaker

Ping


2 posted on 04/30/2007 8:28:30 PM PDT by jdm (The Sidebar Moderator is your friend.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: jdm

Being a Unix/Linux bigot, I laugh at Microsoft AND Apple.


3 posted on 04/30/2007 8:33:04 PM PDT by Laptop_Ron
[ Post Reply | Private Reply | To 1 | View Replies]

To: Laptop_Ron

Why the bias against FreeBSD?


4 posted on 04/30/2007 8:36:19 PM PDT by kawaii (Orthodox Christianity -- Proclaiming the Truth Since 33 A.D.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: kawaii

okay,okay, okay. BSD too. I just don’t happen to use BSD. I’m an AT&T UNIX guy, not a Berkeley guy.


5 posted on 04/30/2007 8:38:46 PM PDT by Laptop_Ron
[ Post Reply | Private Reply | To 4 | View Replies]

To: jdm

It’s true. Vista is more secure than OS X.

Until you install it.


6 posted on 04/30/2007 8:39:37 PM PDT by noblejones (Ben Stein for President, 2008.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Laptop_Ron

No OS is safe if hackers are determined to crack it.


7 posted on 04/30/2007 8:40:13 PM PDT by CAWats (Memo from Bush to O'Donnell and Baldwin: No weapon formed against me will prosper.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: jdm

While I have total respect for these code wizards, I have to ask myself, just what did they they do with their lives before these vulnerabilities became part of the public domain? I hope they have “real” lives on the outside.


8 posted on 04/30/2007 8:41:07 PM PDT by printhead
[ Post Reply | Private Reply | To 1 | View Replies]

To: CAWats

Of course. None are completely secure, even when tightened. That’s why some of us go for safER OSs. Make mine UNIX/Linux.


9 posted on 04/30/2007 8:42:40 PM PDT by Laptop_Ron
[ Post Reply | Private Reply | To 7 | View Replies]

To: jdm

You would think with the PC hacker people out there who have a virulent distaste for all things Apple (and they are out there) that ONE of them would write a virus or spyware that would infect the OS.

Just one.

I wonder why it has not happened?

Perhaps people only write for what they know, and Mac users just are not interested in screwing up other people’s computers. If that is true, it would appear there are a lot of PC users who want nothing more than to foul up the experience of people using PCs, but their specialized knowlege limits them to befouling PCs.

What do you think?


10 posted on 04/30/2007 8:43:38 PM PDT by rlmorel (Liberals: If the Truth would help them, they would use it.)
[ Post Reply | Private Reply | To 2 | View Replies]

Who’d want to hack a low-share OS like Vista.

Wait til it has as many users as Mac.

:)


11 posted on 04/30/2007 8:44:15 PM PDT by D-fendr
[ Post Reply | Private Reply | To 7 | View Replies]

To: jdm

I find Vista’s security alerts incredibly annoying. When it’s time to upgrade my home computer it will either be to a Mac or some flavor of Linux.


12 posted on 04/30/2007 8:44:52 PM PDT by kms61
[ Post Reply | Private Reply | To 1 | View Replies]

To: printhead

If they have lives on the “outside”, it’s limited I believe. The people who are really good at this tend to put in lots of time on computers, which limits normal social interaction. Think of them as workaholics. Very intelligent workaholics.


13 posted on 04/30/2007 8:45:36 PM PDT by Laptop_Ron
[ Post Reply | Private Reply | To 8 | View Replies]

To: Laptop_Ron

It’s only “safer” because not too many people use it. If everyone moved to UNIX/Linux it would not be safe at all.


14 posted on 04/30/2007 8:47:08 PM PDT by CAWats (Memo from Bush to O'Donnell and Baldwin: No weapon formed against me will prosper.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: jdm
Did he get root level access? Or did he just commandeer quicktime?
15 posted on 04/30/2007 8:50:11 PM PDT by LeGrande (Muslims, Jews and Christians all believe in the same God of Abraham.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: rlmorel

You didn’t ask me, but I’ll answer anyway. It’s all in the numbers. When hackers write malicious code, they do it to affect the most people they can. The PC user base dwarfs Mac and UNIX/Linux home users. You write a virus for a PC to get the most bang for the buck.

Besides, if the hackers did enough of the necessary research about Macs to enable them to hack one, they might find that they like Macs.

Just an opinion, of course.


16 posted on 04/30/2007 8:50:39 PM PDT by Laptop_Ron
[ Post Reply | Private Reply | To 10 | View Replies]

To: CAWats

On what do you base that assertion?


17 posted on 04/30/2007 8:51:27 PM PDT by Laptop_Ron
[ Post Reply | Private Reply | To 14 | View Replies]

To: Laptop_Ron
On the fact that hackers want to bring down as many computers as possible. Again, if every computer user dropped Windows, etc and starting using UNIX/Linus exclusively, it wouldn't’t be long before that OS would become vulnerable. It would be a challenge to hackers; and they cannot resist a challenge.
18 posted on 04/30/2007 8:57:35 PM PDT by CAWats (Memo from Bush to O'Donnell and Baldwin: No weapon formed against me will prosper.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: CAWats
Did this hacker get root level access? Or was this just a Quicktime vulnerability?
19 posted on 04/30/2007 9:01:38 PM PDT by LeGrande (Muslims, Jews and Christians all believe in the same God of Abraham.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Laptop_Ron

“If they have lives on the “outside”, it’s limited I believe. The people who are really good at this tend to put in lots of time on computers, which limits normal social interaction. Think of them as workaholics. Very intelligent workaholics.”

Although I am not a hacker, I did a lot of work using assembler languages and I know how much work hacking involves. Though I stopped programming professionally years ago, I spent many long nights implementing applications.


20 posted on 04/30/2007 9:03:29 PM PDT by CAWats (Memo from Bush to O'Donnell and Baldwin: No weapon formed against me will prosper.)
[ Post Reply | Private Reply | To 13 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-53 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson