Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:20 AM
David Maynor
David Maynor

Java Trouble Brewing For Apple

Like most computer geeks with the latest toys, I can always find a way to play rather than work. My procrastination tendencies can sometimes lead to troubling results (just ask my girlfriend), so I often give vendors some leeway when it comes to patching vulnerabilities. But some vendors just don't get it.

Like most computer geeks with the latest toys, I can always find a way to play rather than work. My procrastination tendencies can sometimes lead to troubling results (just ask my girlfriend), so I often give vendors some leeway when it comes to patching vulnerabilities. But some vendors just don't get it.Patching vulnerabilities is never as easy as changing a line of code and recompiling. Vendors that integrate open-source projects have an even harder problem because the details of a flaw might be fixed in a source tree long before they are able to bundle a fix and get it into users hands. I call this window between an open-source project fixing a security program and a commercial vendor that deploys the open-source code applying the patch the "window of owning." Basically, you get free bugs if you keep track of what open-source project is patching what and who it affects.

Apple traditionally has a huge "window of owning." A quick look at the number of open-source and third-party apps that go into OS X shows a consistently large opportunity for exploiting OS X users. (While you may be inclined to chalk my thoughts to prior disagreements with Apple, you would be wrong -- and your Mac would remain open to this vulnerability).

A Java vulnerability making recent headlines has given attackers a great chance to use and abuse Mac users worldwide: Landon Fuller published details of a flaw that has long since been fixed in Java, but has yet to be fixed in OS X. The flaw, CVE-2008-5353, was fixed by Sun back in January. This affects OS X users because Apple integrates Java and has yet to make the patch available to its users.

Make no mistake: This bug is trivial to exploit and has a devastating effect. The example Fuller offers on his Website harmlessly uses the "say" command to inform a user that he is vulnerable. This isn't a case of a vulnerability being hyped and not actually dangerous. Because of the design and implementation of Java, many of the security features Apple added to OS X -- like a Non-eXecutable (NX) stack and Address Space Layout Randomization (ASLR) -- have no effect in stopping this exploit.

An attacker with a bit of knowledge could make your OS X machine download a rootkit, start or stop processes, add users, and steal information. These are attacks Mac users generally think they are immune to.

Last year at Defcon, Rob Graham and I discussed how to set up a spear-phishing site that is the first part of a remote penetration test. Since this OS X vulnerability requires no user interaction, works with Firefox and Safari, and gives access to the file system, it's the perfect exploit to use to get a foothold into a network. The best part is if the site is hosted over SSL, none of the perimeter protection will be able to detect the attack. This exploit is a pen tester's Christmas present.

So what's the solution? You can disable Java, but a lot of applications in the enterprise need Java to work. You could try and not visit any Websites, but the way this vulnerability is manifested in OS X, there are plenty of ways to get to it. The only real solution is Apple releasing a patch, but as of today that patch is a little more than four months behind. At this rate, by the time Apple patches the vulnerability, there will probably be another vulnerability that attackers can take advantage of. Happy surfing!

David Maynor is CTO of Errata Security. Special to Dark Reading

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-18
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
PUBLISHED: 2021-05-18
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
PUBLISHED: 2021-05-18
In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files.
PUBLISHED: 2021-05-18
A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
PUBLISHED: 2021-05-18
An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage