, SecurityFocus 2007-04-21
Story continued from Page 1
The QuickTime flaw is approximately the same severity as the recent animated-cursor vulnerability recently fixed by Microsoft and used widely in attacks by groups that appear to operate out of China and Eastern Europe. That flaw was rated Critical by Microsoft.
Flaws exploitable through the browser are fairly easy to find, said HD Moore, founder and developer for the Metasploit Project. Moore used data-fuzzing techniques to find a large number of flaws in Internet browsers a year ago, releasing them as the Month of Browser Bugs in July 2006.
"It makes it a lot easier to find a flaw," Moore said. "There are so many (similar) bugs in Safari."
Yet, Moore and others gave mixed responses comparing the security of the latest Mac and Windows operating systems. Macaulay favored Windows Vista for security, but Dai Zovi said that the Mac seemed to be the more secure platform. He acknowledged that the reason could be because the operating system has far less marketshare.
"While the Mac does not have problems with widespread malware like Windows, if they had that kind of marketshare they would have similar issues," he said. "But, by the time they do get the marketshare, they should be on a trajectory to have much better security than Windows."
There is still a ways to go: Amidst the bustle of cleanup, two security engineers from networking firm Juniper frantically raced to beat the clock and churn out code to reliably exploit a second bug, this time a truly remotely exploitable flaw in the Mac OS X.
The two engineers described the bug as a "really weird" heap overflow in a default service on the Mac. TippingPoint confirmed that the company would pay a second $10,000 bounty for any zero-day flaw that compromised the other system. The two engineers had already decided to give the money to a charity fund at Virginia Tech, where 32 students and faculty had died last week in the United States' worst school shooting.
Yet, the engineers, who asked not to be identified, couldn't get the exploit to work. Around 6 p.m., the conference staff pulled the plug.
After the conference, CanSecWest organizer Dragos Ruiu acknowledged that he may have miscalculated the interest that free MacBooks would generate. Money should have likely been a prize right from the start.
"It is interesting to me that it took a cash prize to bring the flaw out of the woodwork," he said.
For his part, Dai Zovi said the money was not necessarily the object.
"I have a day job in finance, so I'm not hurting," he said. "I think there has been a lot of controversy over Mac vulnerabilities in the last year, and I was hoping to prove something concrete."
CORRECTION: The article was updated with additional information on the flaw. Dino Dai Zovi told SecurityFocus that, while the flaw was exploited through Apple's Safari browser, the actual flaw is in the way QuickTime handles Java commands.