Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/28/2007
04:45 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Apple Flap Redux

David Maynor goes public at Black Hat DC on his side of the Apple wireless exploit story

ARLINGTON, Va. -- Black Hat DC -- Remember the Apple wireless flap after last year's Black Hat in Las Vegas? Well, one of the researchers in the eye of the storm will finally tell "all" publicly here today in his briefing at Black Hat DC. (See Notebooks Vulnerable to Wireless Attack.)

David Maynor, CTO of Errata Security and a former researcher with SecureWorks, says he will tell attendees here during his Device Drivers 2.0 presentation that he and fellow researcher Jon Ellch did provide Apple with information on bugs in its wireless device driver applications after their Black Hat talk. "We did indeed provide information to Apple," Maynor says. "We did point them to bugs and faults in their [device driver applications]."

Maynor says he not only shared this information with Apple, including packet captures, but he also helped the company build a tool to detect the flaws itself.

"But Apple wanted us to say that MacBook was not vulnerable," he says. Maynor, who is unable to discuss any communication he had with Apple via his SecureWorks email account, also will show slides of copies of email exchanges between him and Apple that back up his newly publicized statements.

"We could have shown bugs in their built-in software, but we did not," he says. "We didn't want to put any Apple users at risk. That's why we demo'ed this with a third-party card [D-Link's] and not in a native card."

Maynor says the bottom line is that there are "lots" of vulnerabilities in wireless drivers from Broadcom, Atheros, and other vendors' gear. "The entire point that Apple lost sight of is that this isn't an Apple problem, but a systemic one across the industry."

Apple was not available for comment at the time this story's posting.

In his talk here today, Maynor will also demonstrate a denial-of-service (DOS) attack using the same device driver exploit he and Ellch had previously revealed, but using a Broadcom wireless driver on a Windows machine. He'll also show how the Mac was vulnerable prior to Apple's patches in release 10.4.6.8, as well as release a DOS zero-day exploit for a D-Link card.

He says he actually found the Apple bugs within a few minutes after firing up a brand-new Apple PowerBook he had purchased. "Before I even touched the keyboard, it had crashed. I already had an Apple bug," he says.

Maynor says because Apple was unable to get the exploit to work internally, he helped them build a WiFi auditing box. And Maynor says he also sent Apple information on other wireless problems, including ones with Bluetooth on a MacBook.

Apple later patched the wireless bugs, but did not credit Maynor or Ellch, he says.

"Apple says they found the bugs on their own. But they had used the box I built for them to find them."

The good news in all this is that in the end, Apple did fix the problems, he says.

Maynor says he's mostly relieved to be able to give more of his and Ellch's side of the story. "I'm calling today VA Day -- Victory over Apple," says Maynor, although says he knows the topic will continue to generate debate and controversy.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Apple Inc. (Nasdaq: AAPL)
  • Atheros Communications Inc. (Nasdaq: ATHR)
  • Broadcom Corp. (Nasdaq: BRCM)
  • D-Link Systems Inc.
  • Errata Security
  • Microsoft Corp. (Nasdaq: MSFT)

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    News
    FluBot Malware's Rapid Spread May Soon Hit US Phones
    Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
    Slideshows
    7 Modern-Day Cybersecurity Realities
    Steve Zurier, Contributing Writer,  4/30/2021
    Commentary
    How to Secure Employees' Home Wi-Fi Networks
    Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-27941
    PUBLISHED: 2021-05-06
    Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the...
    CVE-2021-29203
    PUBLISHED: 2021-05-06
    A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gai...
    CVE-2021-31737
    PUBLISHED: 2021-05-06
    emlog v5.3.1 and emlog v6.0.0 have a Remote Code Execution vulnerability due to upload of database backup file in admin/data.php.
    CVE-2020-28198
    PUBLISHED: 2021-05-06
    ** UNSUPPORTED WHEN ASSIGNED ** The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode wh...
    CVE-2021-28665
    PUBLISHED: 2021-05-06
    Stormshield SNS with versions before 3.7.18, 3.11.6 and 4.1.6 has a memory-management defect in the SNMP plugin that can lead to excessive consumption of memory and CPU resources, and possibly a denial of service.