Pwn2Own, Safari First to Fall
Thursday, March 19, 2009 at 07:19PM
drStrangeP0rk

Charlie Miller, a security researcher, used an exploit that he had discovered and perfected last year. If a user clicks on a malicious URL, an attacker can gain access and exploit the users machine, I have not found out if the attack is root or user sand boxed. Luckily this information will be shared with Apple but it addresses a very important point. Macintosh's can be exploited by drive by web attacks, we have also seen this with QuickTime, ICal, Acrobat etc. First up no user should be operating as the administrator when performing user level task including web surfing, email, word processing, etc.  

Make sure policies and procedures about visiting web sites are reviewed and users are not lured into a false sense of security. Education of users and strict policies about administrators and root activity are very important in defending against these kinds of attacks. Network administrators should also update their white and black list of sites (This is always good to reveiw) and review application level proxies, especially at the network boundaries. As with any network, egress filtering of traffic is very important to securing your Macintosh infrastructure. Knowing what is going out is as important to knowing what is coming in. 

Hey baby, it's Unix the beast }:-> 

 

Update on Thursday, March 19, 2009 at 07:46PM by Registered CommenterdrStrangeP0rk

Research Nils has claimed the trifecta, attacking IE 8 and gaining full control of a machine running Windows 7 and a zero-day flaw in Firefox.

Excellent work. }:->

Update on Wednesday, April 1, 2009 at 08:32AM by Registered CommenterdrStrangeP0rk

Firefox 3.0.8 update fixes the flaws in Pwn2Own and Zero Day Flaws, including XSL transformtion vulnerability and XUL tree element code execution. The XUL was used in the Pwn2Own contest. 

Security Advisories for Firefox 3.0

Article originally appeared on magmatic.com (http://www.magmatic.com/).
See website for complete article licensing information.