Bruce Johnson wrote: ---------- > > <http://www.kb.cert.org/vuls/id/CRDY-636R79> note, "no statement from > > vendor", the usual > > response to serious security problems. > > No comment on CERT's web site does NOT mean no action is being taken.
No, it doesn't mean no action is being taken, it does mean the vendor hasn't publicly responded one way or the other, or at least hasn't responded to CERT'S notification, which they should since that's where a lot of people who actually care about security look. ------- > > Before one cries 'Wolf' you may want to see just how many canids are > really around.... I'm not crying wolf, the security whole exist, and did in fact exist when os x was just a glint in apple's eye! I didn't say it was being exploited on a massive scale, that there was a pre-written exploit for the script kiddies. That does not mean it hasn't been exploited or won't be exploited. in fact, it's likely that it was exploited on a limited basis by some simply to practice their skills, though they may not have done it on a large scale, and may not have been caught. the fact that there isn't a publicly known serious instance of this security hole being exploited does not mean it did not happen. things that aren't detected don't usually become public, serious security breaches rarely become public even if detected. there is no basis to assume this hole was never exploited. > > 10.3.5 included the fixed libpng? > <http://docs.info.apple.com/article.html?artnum=25791>. Yes, apple has released a patch/update to correct the problem, which is good and what they should do. however, they are still misleading users. unless you click the security link, all you see is that it fixes the more minor security hole where a users machine may freeze. only after reading the other page do you see that there was in fact a far more serious hole where arbitrary code cold be executed. it is misleading to say that a minor problem has been fixed and provide a link to where you admit a far more serious problem existed but has now been fixed. It is also bad security practice to not release information on a security bug until it is patched, particularly when the information is very widely available, as it was in this case. those using os x for sensitive financial and other applications, and those who suspect an intrusion, need to know about a bug as soon as it is discovered and documented. would you tolerate an auto maker who didn't tell the public about a break failure problem until after they had a fix, even if people weren't dying yet? or would you want to know right away so you could modify your' driving habits? would it not be a good reason to sue an auto maker when a death did occur? the point is, security holes exist, and will exist, it's only prudent to run a hardware firewall as they are cheap and provide substantial security enhancement. a software firewall, run on the same machine as the browser, will often not protect the user from security holes that stem from system software (as in this case) as opposed to application code (i.e. the browser, whichever browser you use). again, apple is actually being less forthcoming than microsoft on these issues, and that is not a good thing for the user. as a side note, my machine has in fact been broken into, though not recently as far as i know....I believe it was a vulnerability in netscape which was made public a week later. my machine started sending a large amount of data (as indicated by the modem lights, they aren't useless) while i was viewing a static web page. i disconnected, on further investigation i found i had been left with a cookie containing the name of my boot drive. this information should not be available to other machines on the net, the only possible use of that piece of data was to make incursion easier in the future. most likely my hard drive was being scanned, possibly for cache files which often contain credit card information (often in "plain text", i.e. not encrypted), possibly for registration codes for software, possibly for other reasons. i was on a dial up connection, had not been logged on long, and wasn't doing anything "interesting". it was a "random" attack. if your' machine is on a broadband connection, particularly if it is "always on" and has a static ip, you are far more vulnerable, as attempts take less time, information on your' machine can be accumulated over time (and often is by serious crackers), and if an incursion should happen, the high speed connection means that a lot of data can be recovered from your' machine very quickly. even encrypted cache files are not very secure if the attacker decides to crack them on their machine, if it takes 2 days to get your credit card number it's not a big problem for them to do it later. if you have sensitive business information on your machine, you may well be targeted by those who practice corporate espionage for a living, or by a competitor (though less common). these people do not report the security flaws they use to break in to vendors or CERT, they do not announce them on hacker bulletin boards. they are not interested in bragging that they've found a hole. they are interested in using that hole and then trying to sell the information they've obtained, or being paid to get more information or sabotage a system. it's entirely possible that the "libpng" hole has been exploited by a few people on mac and other bsd systems, it's unlikely it would have been detected, properly used it might not even be detected by a firewall, particularly on a server which normally sends large amounts of data (as opposed to a machine used for browsing, which mostly receives information and sends little). the more sophisticated, even the more sophisticated amateurs, will modify logs and often manage to erase any log of their activity that is created (though this too is sometimes monitored and used for detection, and sometimes it's the only mistake an intruder makes). also, apple is being far less open about security issues than microsoft, this is a bad practice. apple products have historically had better written code, and been a smaller market segment and attracted less effort on the part of crackers. both of those things are now changing, bsd (the underlying frame work of os x, from which a great deal of code is used unchanged) is becoming a larger target and more effort is being spent to crack these systems. no, there hasn't been a huge, widely spread email virus on the mac yet, but those actually only represent one type of vulnerability, are quickly detected, and a solution is quickly available. direct attacks against a user's machine, or a corporate web server tend to be far more subtle and harder to detect. Larger companies, no matter who's server software they are running, use sophisticated traffic analyses to try and hopefully detect intrusion, data theft or data modification. these larger, more aggressively monitored systems are still cracked occasionally, though they usually at least have a log and can find out how much damage was done, and occasionally who did it, and they can usually block the attempt in the future (or at least detect it immediately and respond more quickly). it's simply prudent to be a little cautious, and to not hide your head in the sand. crying wolf, hardly. just pointing out that there are bad guys out there, and your' mac is not fort knox, nor should it be, but using a firewall, and keeping up with security updates are the least you should do if you do more than play games on your' computer (even if you just don't want your' personal email abused). if your' machine has sensitive business or personal information, or is used for online purchasing, it's the least a responsible person should do. or you can wait until the first widespread mac virus (aka the quicktime virus that spread by files through any medium, and wiped out data because of a simple bad security choice on apple's part. the fix was easy, fixing the damage wasn't) and then act surprised. apparently some feel you should wait until you are robbed before you bother to lock your' house, i consider that irresponsible and have no pitty for fools who don't bother to do the easy things to stop most security problems cold. -- President George W. Bush, Vice President Richard B. Cheney, Secretary of Defense Donald H. Rumsfeld, and Attorney General John D. Ashcroft have committed violations and subversions of the Constitution of the United States of America. <www.VoteToImpeach.org> They should be charged with high treason and imprisoned frankly. If there is no rule of law there can be no civilization. -- G-List is sponsored by <http://lowendmac.com/> and... Small Dog Electronics http://www.smalldog.com | Refurbished Drives | -- We have Apple Refurbished Monitors in stock! | & CDRWs on Sale! | Support Low End Mac <http://lowendmac.com/lists/support.html> G-List list info: <http://lowendmac.com/lists/g-list.shtml> --> AOL users, remove "mailto:" Send list messages to: <mailto:[EMAIL PROTECTED]> To unsubscribe, email: <mailto:[EMAIL PROTECTED]> For digest mode, email: <mailto:[EMAIL PROTECTED]> Subscription questions: <mailto:[EMAIL PROTECTED]> Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/> Using a Mac? Free email & more at Applelinks! http://www.applelinks.com
