Skip to comments.
Gone in 2 minutes: Mac gets hacked first in contest (website-based exploit)
MacWorld ^
| 3/27/08
| Robert McMillan
Posted on 03/27/2008 2:58:47 PM PDT by Yossarian
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-34 next last
Well, I hate to be the bearer of bad news to the Mac crew - but it seems there's yet another vulnerability Apple has to patch ASAP to our favorite OS.
One thing to remember: The victim has to visit a website for it to work. Perhaps it would be wiser to use Firefox until Apple comes out with a Safari patch - that's no guarantee of security, but at least it takes out one possible vector for the attack.
1
posted on
03/27/2008 2:58:51 PM PDT
by
Yossarian
To: Swordmaker
2
posted on
03/27/2008 2:59:16 PM PDT
by
Yossarian
(Everyday, somewhere on the globe, somebody is pushing the frontier of stupidity...)
To: Yossarian
The Fujitsu U810 is one neat, portable computer/ tablet PC.

3
posted on
03/27/2008 3:06:15 PM PDT
by
CarrotAndStick
(The articles posted by me needn't necessarily reflect my opinion.)
To: Yossarian
Guess the cyber alqueda is out there and needs to go to Camp Gitmo with the other scum too.
4
posted on
03/27/2008 3:06:42 PM PDT
by
johna61
To: Yossarian
Well, I hate to be the bearer of bad news to the Mac crew - but it seems there's yet another vulnerability Apple has to patch ASAP to our favorite O
"...the rules were relaxed so that attackers could direct contest organizers using the computers to do things like visit Web sites or open e-mail messages."
I'll remember that the next time a hacker directs me on what to do and when to do it on my computer.
5
posted on
03/27/2008 3:15:26 PM PDT
by
aruanan
To: johna61
Guess the cyber alqueda is out there and needs to go to Camp Gitmo with the other scum too. Well, just to be crystal clear, Mr. Miller is a good guy - doing "white hat" hacking. He signed a non-disclosure agreement, and the OS vendors - in this case, Apple - will be notified of the security hole.
Thanks to guys like Charlie Miller, we have a much safer computing environment - (white) hats off to them!
6
posted on
03/27/2008 3:17:18 PM PDT
by
Yossarian
(Everyday, somewhere on the globe, somebody is pushing the frontier of stupidity...)
To: aruanan
I'll remember that the next time a hacker directs me on what to do and when to do it on my computer. Visiting a website - if that's all it is - isn't much of a difficult social exploit.
7
posted on
03/27/2008 3:19:07 PM PDT
by
Yossarian
(Everyday, somewhere on the globe, somebody is pushing the frontier of stupidity...)
To: aruanan
I'll remember that the next time a hacker directs me on what to do and when to do it on my computer. But there are tons of people who won't when they get a link in an email and think, "Hey, I'm using a Mac. I'm bulletproof" right before they click it.
8
posted on
03/27/2008 3:27:26 PM PDT
by
Bloody Sam Roberts
(Great spirits will always encounter violent opposition from mediocre minds.)
To: Bloody Sam Roberts
But there are tons of people who won't when they get a link in an email and think, "Hey, I'm using a Mac. I'm bulletproof" right before they click it.
Remember, though, this was done by someone who directed what was being used, when it was used, and knew where it was being used. But good for him in finding the problem. In anything that complex, there are bound to be unexpected connections that can be exploited in unexpected ways. The funny thing is, though, that some folks seem to believe the advent of the few and far between instances is but a harbinger of a flood of attacks that will render the Mac OS as Swiss cheesed as Windows.
9
posted on
03/27/2008 3:36:32 PM PDT
by
aruanan
To: aruanan
The funny thing is, though, that some folks seem to believe the advent of the few and far between instances is but a harbinger of a flood of attacks that will render the Mac OS as Swiss cheesed as Windows.Do you think the constant littany of claims that an Windows OS is full of holes, and MACS aren't had anything to do with the obvious complacency that let this happen?
10
posted on
03/27/2008 3:43:21 PM PDT
by
tacticalogic
("Oh bother!" said Pooh, as he chambered his last round.)
To: tacticalogic
It must be some Microsoft-paid show, a super tweaked Windows OS versus a OS X with no user password, vulnerable services all opened! Long time ago was a super tweaked NT versus an unpatched Linux.
11
posted on
03/27/2008 3:59:42 PM PDT
by
hamboy
To: tacticalogic
Do you think the constant littany of claims that an Windows OS is full of holes, and MACS aren't had anything to do with the obvious complacency that let this happen?
Ha ha ha. Complacency?
12
posted on
03/27/2008 4:17:37 PM PDT
by
aruanan
To: aruanan
All three computers were tested under the same rules, and the MAC went down. And it went down first. Whatever they did to compromise that machine is apparenly known, and the production OS is vulnerable.
Whatever "holes" are in the Windows OS, it doesn't fix what's wrong with that MAC OS. As long as the idea persists that simply complaining that Windows is worse is the way to address it, it's going to stay broken.
13
posted on
03/27/2008 4:59:10 PM PDT
by
tacticalogic
("Oh bother!" said Pooh, as he chambered his last round.)
To: 1234; 50mm; 6SJ7; Abundy; Action-America; aristotleman; af_vet_rr; Aggie Mama; afnamvet; ...
The Mac falls first in Hacking contest of OS X, Linux, and Vista... but only after the rules were relaxed and a file was downloaded from a website and executed. Note also that the rules allowed the hackers to use anything already installed on the computers - and the contest operators installed a package of "typical" third party applications on each. At this point it is unknown what vulnerability was used to breach the Mac... OS X or third party... as the contest requires the successful hacker to sign a non-disclosure contract until the vendor of the vulnerable software/hardware has a chance to fix it.

Mac hacked Ping!
If you want on or off the Mac Ping List, Freepmail me.
14
posted on
03/27/2008 6:37:14 PM PDT
by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
To: Yossarian
. . . in this case, Apple - will be notified of the security hole. Not necessarily. In this year's contest, the computers being targeted were not just out-of-the-box fresh start-ups. The operators of the contest installed a selected set of "typical" applications for each OS. Contestants were permitted to use any installed software to accomplish their attacks.
Last year, the Mac was breached in the same manner... requiring a referee to navigate the Mac using Safari to a prepared website and download a specific file. That was a fresh install of only Apple supplied applications and the vulnerability that allowed the exploit was actually in Java, accessed through Quicktime.
This year, the same directions resulted in a similar result... but we do not yet know what apps were installed or required by the hacker to be used. Therefore, both Apple and possible third party vendors may be notified.
It strikes me that Firefox may have been included in the "typical" software installation. That doesn't mean that it wasn't a purely OS X vulnerability.
As last year, Root was not achieved. The successful hacker only breached a user account.
My hat is off to Mr. Miller as well.
15
posted on
03/27/2008 6:54:01 PM PDT
by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
To: Swordmaker
I’ve visited several web sites that tried to download software on my mac, but it always pops up and tells me it’s an executable. Do you know if the exploit was exploited by directing the user to override an execute command, or did just visiting the web site allow the code to download and execute?
16
posted on
03/27/2008 6:57:44 PM PDT
by
Richard Kimball
(Sure, they'd love to kill me, as long as they can do it without admitting I exist)
To: Swordmaker
Given that he’s a long-time Apple hacker and the speed of which he did it, he already knew about the flaw and had the code ready to exploit it.
To: Swordmaker
stunt:
noun
an action displaying spectacular skill and daring.
something unusual done to attract attention
18
posted on
03/27/2008 8:00:48 PM PDT
by
vox_freedom
(John 16:2 yea, the hour cometh, that whosoever killeth you, will think that he doth a service to God)
To: Yossarian
Maybe. I didn’t see anything, beyond speculation, that said it was a Safari problem.
It might be in the OS itself.
19
posted on
03/27/2008 8:12:54 PM PDT
by
null and void
(It's 3 AM, do you know where Hillary is? Does she know where Bill is? Does Bill know what 'is' is?)
To: Yossarian
I have a mac mini and love it...I just hate Safari...I use Firefox and it works great...
20
posted on
03/27/2008 8:18:49 PM PDT
by
Gone_Postal
(We are not interested in the possibilities of defeat)
Navigation: use the links below to view more comments.
first 1-20, 21-34 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson