This article is more than 1 year old
A Mac gets whacked, a second survives
CanSecWest PWN to Own contest beaten
The Safari flaw is approximately the same severity as the recent animated-cursor vulnerability recently fixed by Microsoft and used widely in attacks by groups that appear to operate out of China and Eastern Europe. The flaw was rated critical by Microsoft.
Browser flaws are fairly easy to find, said HD Moore, founder and developer for the Metasploit Project. Moore used data-fuzzing techniques to find a large number of flaws in internet browsers a year ago, releasing them as the Month of Browser Bugs in July 2006.
"It makes it a lot easier to find a flaw," Moore said. "There are so many (similar) bugs in Safari."
Yet, Moore and others gave mixed responses comparing the security of the latest Mac and Windows operating systems. Macaulay favoured Windows Vista for security, but Dai Zovi said the Mac seemed to be the more secure platform, but acknowledged that the reason could be because the operating system has far less marketshare.
"While the Mac does not have problems with widespread malware like Windows, if they had that kind of marketshare they would have similar issues," he said. "But, by the time they do get the marketshare, they should be on a trajectory to have much better security than Windows."
There is still a way to go: Amidst the bustle of cleanup, two security engineers from networking firm Juniper frantically raced to beat the clock and churn out code to reliably exploit a second bug, this time a truly remotely exploitable flaw in the Mac OS X.
The two engineers described the bug as a "really weird" heap overflow in a default service on the Mac. TippingPoint confirmed that the company would pay a second $10,000 bounty for any zero-day flaw that compromised the other system. The two engineers had already decided to give the money to a charity fund at Viriginia Tech, where 32 students and faculty had died last week in the United States' worst school shooting.
Yet, the two engineers, who asked not to be identified, couldn't get the exploit to work. Around 6pm, the conference staff pulled the plug.
After the conference, CanSecWest organiser Dragos Ruiu acknowledged that he may have miscalculated the interest that free MacBooks would generate. Money should have likely been a prize right from the start.
"It is interesting to me that it took a cash prize to bring the flaw out of the woodwork," he said.
For his part, Dai Zovi said the money was not necessarily the object.
"I have a day job in finance, so I'm not hurting," he said. "I think there has been a lot of controversy over Mac vulnerabilities in the last year, and I was hoping to prove something concrete."
This article originally appeared in Security Focus.
Copyright © 2007, SecurityFocus