MAAS History
Archives

Entries by drStrangeP0rk (171)

Friday
Mar272009

Firefox Zero day in the Wild

Guido Landi has discovered a security flaw in Firefox to parse an particular XSL element. Windows and Linux are the platforms affected but it is safe to say that the Mac may be also be vulnerable. That nice thing is that a patch is availably, make sure to update to the latest version of Firefox.

Thursday
Mar192009

Pwn2Own, Safari First to Fall

Charlie Miller, a security researcher, used an exploit that he had discovered and perfected last year. If a user clicks on a malicious URL, an attacker can gain access and exploit the users machine, I have not found out if the attack is root or user sand boxed. Luckily this information will be shared with Apple but it addresses a very important point. Macintosh's can be exploited by drive by web attacks, we have also seen this with QuickTime, ICal, Acrobat etc. First up no user should be operating as the administrator when performing user level task including web surfing, email, word processing, etc.  

Make sure policies and procedures about visiting web sites are reviewed and users are not lured into a false sense of security. Education of users and strict policies about administrators and root activity are very important in defending against these kinds of attacks. Network administrators should also update their white and black list of sites (This is always good to reveiw) and review application level proxies, especially at the network boundaries. As with any network, egress filtering of traffic is very important to securing your Macintosh infrastructure. Knowing what is going out is as important to knowing what is coming in. 

Hey baby, it's Unix the beast }:-> 

 

Thursday
Mar122009

Zero Day: Acrobate Reader Still Out There

Adobe's current fix does not fix the actual vulnerability but you should update to version 9.1. At the firewall level it may be prudent to block PDF's from un-trusted sources. The Zero Day PDF has malicious code that can exploit a buffer overflow allowing execution of code on your system. First up you should not have JavaScript enabled, if it is disable it right away. This exploit may crash Reader if you disable JavaScript but it will be unable to install the malicious code onto your system. 

One important aspect of defense against this exploit is education of users, make sure to review attachment policies and procedures. Users should not open any documents from un-trusted or unknown sources. (Make sure that your policies and procedures give users clear guidance including case examples.) Trust and un-trusted sources can be filtered at the external fire wall which you should be doing already. 

 

CVE number: CVE-2009-0658

Wednesday
Jan282009

Mac Trojan Horse OSX.Trojan.iServices.A

I debated even including this since if you download illegal software do so at your own risk. Currently circulating various BitTorrent tracker sites and other sites which are know to offer pirated software is a Mac Trojan Horse named  OSX.Trojan.iServices.A. When a user installs the illegal copy of IWorks the first item installed is this Trojan in /System/Library/StartupItems/iWorkServices . The Trojan notifies the attacker that it is alive. The attacker can remotely connect to the compromised system and  perform operations as root. (If you have set up your system as root and have a limited admin the Trojan executes at that privilege level.)

Make sure never to install illegal software on your computer! When using BitTorrent always know the source and confirm the MD5 and SHA to the developers site, contact them if you must. There is no 100% protection and most Open Source offerings are sound, you however are responsible for the accumulation of evidence to establish a acceptable chain of trust. Know what your getting, check what your getting, trust what your getting.

Remember Mr. Mulder, "Trust NO ONE." X

Thursday
Jan222009

Quick Time 7.6 Fixes Several Vulnerabilities

Similar to other user click and view attacks, the user is the gateway to the attack. The attacker entices a user to click on a link to view a movie file that has the malicious code in it. In the most of extreme cases the attacker can gain control of your computer and execute code on it.