MAAS History
Archives
Tuesday
Jul142009

Critical JavaScript Vulnerability in Firefox 3.5

There is a critical vulnerability in the JIT compiler in Firefox 3.5. It is possiable that an attacker by directing a user to a maliciously crafted site will be able to execute code or trigger a uncontrolled system crash. Users should be using NoScript for all web surfing in Firefox. In addition users can disable JavaScript, Run in SafeMode or disable JIT in the JavaScript engine.

  1. In the location bar enter about:config
  2. Filter to jit
  3. Set the value of javascript.options.jit.content to false.

 

Disabling javascript.options.jit.content will slowdown performance and is temporary. Once the fix is released and installed users should set this value back to true. 

Thursday
Jul092009

Safari 4.0.2 Update Addresses WebKit Issues

WebKit when handling parent objects has a vulnerability which can allow for a maliciously crafted site to conduct a XSS attack. The improvement is in the way the WebKit handles parent objects. Simple Class Dump from Safari 4.0.1In addition numeric character references crafted in a malicious way can corrupt memory leading to unexpected application termination and/or arbitrary code execution. 

 

Thursday
Jul022009

RSPlug.M Variant of Old Mac Trojan

Currently it has been reported that this Trojan is making it way across the Web hiding on music sites offering music from such artist as 2Pac. Common names of links include "Fast Mp3 Music Downloader" and "MacCinema" and a host of others listed in earlier post which offer to install codecs but instead will install RSPlug.M. Users should not install any kind of video codec or software for that matter which the source is not certified as trusted either by the organization or independent verification. 

Wednesday
Jul012009

Firefox 3.5 Speed Up and New Privacy Browser Mode

Firefox 3.5 has significant improvements in speed especially when it comes to handling JavaScript heavy pages. This now puts it on par with Safari 4.0, in my case it performs better. The major security improvements includes a safe browser mode which does not store history, cookies, temp files and other information related to your browser session. There is also the addition of the Origin header for their Content Security Policy (CSP). This is an attempt to prevent drive-by-downloads and limit the threat of Cross Site Scripting (XSS). For more information connect to the reference on the Mozilla Security Blog.

Tuesday
Jun232009

Trojan Jahkav-C, more to come?

Similar to the way in which users are enticedto install helper applications on the PC, Mac users who visit sites that deliver porn, such as PornTube(which should be on your black list), may get more then they bargain for. The downloaded Trojan hasnames such as HDTVPlayer3.5.dmg, VideoCodec.dmg, macTubePlayer.dmg. This is not self replicating, the user is the defense and it contacts the attacker. When installing applications from the Web users should make sure they trust the source, especially if they need to provide their admin(root) password. Checking the hash (MD5 and SHA) can go a long way as well in ensuring that the file recieved is the intended file.

The Trojan works by using a Perl script that communicates over http allowing the infected computer to exchange data with the attacker. Users may also find a malicious shell scriptsAdobeFlash in the /Library/Internet Plug-Ins. This is a variant of OSX.RSPlug, OSX/Puper and OSX/Jahlav.