Less Than a Minute to Hijack a MacBook's Wireless 390
Kadin2048 writes "As reported by Ars Technica and the Washington Post, two hackers have found an exploitable vulnerability in the wireless drivers used by Apple's MacBook. Machines are vulnerable if they have wireless enabled and are set to connect to any available wireless network, fairly close to their default state, and the exploit allows an attacker to gain "total access" -— apparently a remote root. Although the demo, performed via video at the BlackHat conference, takes aim at what one of the hackers calls the "Mac userbase aura of smugness on security," Windows users shouldn't get too smug themselves: according to the Post article, "the two have found at least two similar flaws in device drivers for wireless cards either designed for or embedded in machines running the Windows OS." Ultimately, it may be the attacks against embedded devices which are the most threatening, since those devices are the hardest to upgrade. Currently there have not been any reports of this vulnerability 'in the wild.'" According to this story at ITwire.com, they were able to exploit Linux and Windows machines, too. (Thanks to Josh Fink.)
Mac Users (Score:5, Funny)
Re:Mac Users (Score:5, Funny)
(For the humour challenged among you, this is a joke. I know there are a lot more than 1000 Mac users. Only stupid mods mod jokes as trolls and flamebait.)
Re:Mac Users (Score:5, Informative)
Next?
Re:Mac Users (Score:3, Informative)
Did anyone even look at it? (Score:3, Informative)
That's ridiculous (Score:5, Funny)
Re:That's ridiculous (Score:5, Funny)
C'mon, don't tell me you've never taken your laptop to the "reading room".
Actually, your Powerbook probably IS safe! (Score:5, Informative)
MacBooks use different wireless drivers (because they have Intel wireless chips). Your Powerbook has the old Airport card; unless there's also a similar flaw in it, it's safe.
Re:Actually, your Powerbook probably IS safe! (Score:3, Informative)
So MacBooks are not normally venerable to this sort of attack: they went out of their way to introduce third-party hardware that opened the door to the attack. I am not saying that Apple should not work to close even that door, bu
Re:Actually, your Powerbook probably IS safe! (Score:5, Informative)
Re:Actually, your Powerbook probably IS safe! (Score:2)
Hey now, I didn't say that -- Macs are by no means perfect. My old iBook, for example, is much slower and heavier than it would have needed to be if it were an x86. My new iMac is flawed because it contains a TPM (my G5 iMac broke; this was the warranty replacement -- if I had had a choice, I probably wouldn't have bought it).
So yeah, Macs have flaws. It's just that security (compared to a Windows PC) isn't one of them.
Re:Actually, your Powerbook probably IS safe! (Score:5, Funny)
It was bad enough when all this "oil crisis" nonsense ruined my H2 Hummer for me. Overnight I became "guy who's supporting terrorism." It was so much better when I was just "guy with a small penis."
-Eric
Re:That's ridiculous (Score:5, Funny)
With "undetectable rootkit detection software", duh....
Unless the rootkit has an "undetectable rootkit detection software" detector and tries to disable it, then you need "undetectable rootkit detection software detector detector software" to disable the rootkit's detector - no big deal..
Smug Mac users? (Score:2, Insightful)
Re:Smug Mac users? (Score:2)
It does, however, make me feel very smug as an OpenBSD user who has had to put up with Linux users telling me that running blobs in ring 0 is the 'pragmatic' thing to do.
Re:Smug Mac users? (Score:2)
You don't need to connect to be exploited.
It does, however, make me feel very smug as an OpenBSD user who has had to put up with Linux users telling me that running blobs in ring 0 is the 'pragmatic' thing to do
Hmmmmn, while I agree that openBSDs security is superior to linux's in almost every way, I've never really understood the POV of someone who feels superior for using an O/S (Theo ha
Re:Smug Mac users? (Score:3, Informative)
Re:Smug Mac users? (Score:3, Interesting)
I think a little smugness could be allowed, when a lot of people just put up with the wrong way of doing things, or put up with being trodden on by vendors, when the vendors should be at OUR mercy when it comes to their success. A few people (the smug) demand things be done right, securely and openly a
Re:Smug Mac users? (Score:3, Funny)
Many will begin by saying "This is not a virus" or noting you need proximity to take advantage of this flaw.
Well, they would be saying that, if someone hadn't gone and corrupted their MacBooks via wireless exploit...
Marketing... (Score:2)
Don't exepct all Mac users to be as dumb as the Apple marketing people who started playing the "Macs are more secure than...." card without checking with the nerds in Apple's development division first. If they had bothered to do so they would probably have been told that is not a good idea. That whole Get a Mac [apple.com] ad campaign acutally makes m
Re:Smug Mac users? (Score:3, Insightful)
Actually, they'll be pointing out that there the flaw is not in Mac OS X or even AirPort. It's in a third-party wireless card. And since MacBooks and MacBook Pros have AirPort built-in, what Mac user is going to buy a vulnerable card? The article was completely disingenuous, and the researchers were basically dickheads. Cool exploit, but
Re:Smug Mac users? (Score:3, Interesting)
Second, this really isn't Apple's fault. It is the fault of their vendor that made the card and wrote the software driver for it. One of the main arguments of the "Windows fanboys" is that driver issues are not Microsoft's fault and that environment richness is one reason why they shouldn't be totally blamed for instability.
Well guess what? So that particular bug finally bit Apple. Do ya know what we'll do? Take our new wireless Mighty Mic
Re:Smug Mac users? (Score:2, Insightful)
As much as I hear that phrase, Apple should make it their part of their logo.
-Eric
Re:Smug Mac users? (Score:3, Informative)
Re:Smug Mac users? (Score:2)
I'm going to guess that this is a full-blown root compromise. There have been rumblings for several weeks now about new attacks against wireless drivers themselves, and this Blackhat presentation seems to be the public release of that research.
But... (Score:4, Funny)
never mind.
Linux Wireless (Score:5, Funny)
Requests for testing have been sent to the guy in California who were rumoured to have gotten it running though.
A Mac Exploit (Score:5, Funny)
In related news... (Score:5, Informative)
Uh (Score:5, Insightful)
This exploit is OS independent. How is this in any way indicative of Mac user smugness? Are they so smug that they made Windows and Linux boxes explotable too?
Re:Uh (Score:5, Informative)
MOD PARENT UP! (Score:2)
...and people still wonder why we say "open-source is better."
Re:Uh (Score:2)
Re:Uh (Score:4, Informative)
There are two possibilities here. If the testing driver is in the firmware, then it will still be present in OpenBSD. Since the firmware does not run on the host CPU, however, compromising it is only useful if you can then return something to the driver that will be executed, usually be exploiting a flaw in the driver causing it to execute arbitrary code in ring 0.
The other alternative is that this really is a driver you are talking about. In which case, it would not be present in OpenBSD, since the OpenBSD driver is a clean-room implementation and shares no code with the official driver.
And if OpenBSD has no problem and its the OS driver that needs replacing, then Apple will just take your OpenBSD driver and port it to their system, problem solved. That is why they went with BSD, they can borrow from any BSD that is out there.
I'm sorry, but that's not even remotely true. OS X uses IOKit for all device drivers, which is an Embedded C++ API. OpenBSD and FreeBSD use derivatives of the old BSD device API. It is possible to port device drivers between FreeBSD and OpenBSD relatively easily, because the API changes between the two have been small and incremental. If you try 'porting' a network driver from OpenBSD to OS X, then what you are really doing is using the OpenBSD driver as a substitute for real documentation and writing a driver from scratch. Doing this is likely to introduce bugs, since code (even good code) is a poor substitute for documentation.
Re:Uh (Score:2)
Re:Uh (Score:4, Informative)
Re:Uh (Score:2)
No, I think they're really talking about the attitude that some, I say some Mac users have that somehow their machines and OS are invulnerable, the computer equivalent of Fort Knox. I find that people who spend too much time bragging about something often get their comeuppance when someone else more fanatical decides to prove them wrong. Yes, Macs
Re:Uh (Score:5, Insightful)
Re:Uh (Score:3, Funny)
Should be modded +5 Shining Example.
Re:Uh (Score:2)
Spin (Score:3, Interesting)
The flaw was found in a number of wireless drivers; they purposely chose to demonstrate it (in their video, which I haven't been able to find on the web anywhere) using a MacBook, because of that "aura of smugness."
Apparently their biggest complaint is those Mac/PC Apple ads: "'We're not picking specifically on Macs here, but if you watch those 'Get a Mac' commercials enough, it eventually makes you want to stab one o
Re:Uh (Score:2, Informative)
2. We claim that there are no (or few) exploits in the wild BECAUSE ITS TRUE!
3. We look down our noses (at least some of us do, not all)
Re:Uh (Score:2)
Please ensure that brain is engaged before putting mouth (keyboard) in gear...
Third party wireless card? (Score:5, Interesting)
The built-in card IS vunerable (Score:5, Informative)
During the course of our interview, it came out that Apple had leaned on Maynor and Ellch pretty hard not to make this an issue about the Mac drivers -- mainly because Apple had not fixed the problem yet. Maynor acknowledged that he used a third-party wireless card in the demo so as not to draw attention to the flaw resident in Macbook drivers. But he also admitted that the same flaws were resident in the default Macbook wireless device drivers, and that those drivers were identically exploitable. And that is what I reported.
Re:Third party wireless card? (Score:4, Funny)
Because someone is running a pirated version of OS X on a "beige" PC?
Re:Third party wireless card? (Score:2)
Re:Third party wireless card? (Score:2)
Just off the top of my head:
Re:Third party wireless card? (Score:2)
This is a driver vulnerability, not an apple one.
Next.
Yes, they are (Score:3, Informative)
No fix yet.
More disturbing (Score:5, Insightful)
Re:More disturbing (Score:3, Insightful)
Why did they need a 3rd party card? (Score:5, Insightful)
Re:Why did they need a 3rd party card? (Score:2)
Maybe to get 802.11a backward compatiblity? Or to upgrade to 802.11n when it becomes available? I realize upgrading the hardware is a foreign concept to most Mac users but there must be some out there do it instead of throwing away their old Mac and buying a new one.
Apple's wiress drivers are flawed too, read ... (Score:5, Informative)
During the course of our interview, it came out that Apple had leaned on Maynor and Ellch pretty hard not to make this an issue about the Mac drivers -- mainly because Apple had not fixed the problem yet. Maynor acknowledged that he used a third-party wireless card in the demo so as not to draw attention to the flaw resident in Macbook drivers. But he also admitted that the same flaws were resident in the default Macbook wireless device drivers, and that those drivers were identically exploitable. And that is what I reported.
( Looks like Apple was wielding a big stick
Re:Apple's wiress drivers are flawed too, read ... (Score:3, Insightful)
It makes no sense, and so it sounds like a load to me.
Also, the fact that they go through all this work to find one possible flaw means that Mac owners should still be smug.
No, I don't own a Mac.
Recent Intel Windows WLAN driver vulnerabilities (Score:2, Informative)
Intel information about affected drivers [intel.com]
Fixes can be found here [intel.com]
3rd party (Score:3, Informative)
And I was joking about this on a security mailing list yesterday. I mean, come on: 3rd party drivers that nobody is using anyways because the ones you get with the system are perfectly ok? What's next? Writing the exploitable drivers yourself?
Re:3rd party (Score:5, Informative)
Read Brian Krebs' follow up
http://blog.washingtonpost.com/securityfix/2006/0
Apple 'leaned heavily' on the presenters to make them use a different card. The built in card *is* vulnerable.
Only with third party wireless card (Score:3, Insightful)
I would suspect that the problem is that a wireless connection can be created without knowledge of the user, and a user who has a Macintosh that was made vulnerable but should be safe because it has no network connection would unexpectedly be unsafe.
Re:Only with third party wireless card (Score:2)
1) Buy a 3rd party wireless card
2) Install faulty 3rd party drivers
3) Somehow bless 3rd party card so it's default instead of airport
4) Running as an admin, turn on airport, don't find any preferred networks, join a random one, which happens to be the hacker's.
In short, it's pretty hard to accidentally do this. Also auto-wireless-connect requires you to turn Airport on. It finds trusted/known networks first, and prompts if the network is not previously known. A
Say No to 'closed' drivers (Score:2)
And BTW, there ought to be a simple method to avoid Loadable Kernel Modules, and stick with statically linked and built ones, for reasons of security.
Linux rather be Not Yet Ready for the desktop, rather than joining the Desktop bandw
Re:Say No to 'closed' drivers (Score:2)
> Linux rather be Not Yet Ready for the desktop, rather than joining the Desktop bandwagon, and becoming yet another Patch --> Update --> Service Pack --> Antivirus --> Unstable kind of a desktop OS.
Funny, I thought it's already a continual patch->update cycle without even being reliable on the desktop already.
Re:Say No to 'closed' drivers (Score:2)
Hey this is Free Software! There's no "one" Linux. In this case Debian Stable and Linspire respectively tend towards either side of the choice you present. Granted, there are probably distros out there that are just as desktop-ready as Linspire but more secure, so you may not have to choose at all.
The ISC discussed this yesterday (Score:5, Informative)
Watch the video (Score:5, Informative)
The actual video is here [washingtonpost.com].
Macbook pros safe? (Score:2)
It was an external USB Device (Score:2, Insightful)
the Bottom Line (Score:5, Insightful)
This is disgusting. No matter how many stories you run about Mac OSX and how it "really isn't secure" two facts will remain:
1) It's more secure than Windows. There are both less flaws and less exploits. It doesn't matter why, it's still true and, most likely, it will remain true for a long time to come. It's difficult to prove which has less flaws because neither is open source, but I think all of you, no matter how devoted to Microsoft you are, know deep down what would happen if both systems went open source tomorrow. It's very easy to prove which has less exploits, and it makes no difference whether that's because of less flaws, a different user base, a smaller user base, or some combination of the three because the net effect is a safer OS. Even if you disagree with the statement that OS X has less flaws on the basis that you believe it is secretly harboring more crappy code than Windows my second argument still holds.
2) There are almost never any malicious programs of any kind spread among Mac OS X users, unless you count people sharing copies of Windows XP to be installed with BootCamp. This may change in the future, but I doubt it.
Re:the Bottom Line (Score:3, Insightful)
Sounds like they need to get their stories straight.
About half of the claims they make about this exploit aren't shown in the video, and much of the rest of the claims are exactly the opposite of what's actually shown ("any open wireless connection," yet they do a connection directly to the hacking computer, and we don't get to
Right (Score:3, Insightful)
This "Fact" you say exists... What evidence do you have to support this fact?
Are you sure it's not merely your opinion?
Re:the Bottom Line (Score:3, Informative)
Re:the Bottom Line (Score:4, Interesting)
Sadly true, though it's just as true that as long as you're alive on planet Earth, you're not safe, either.
Get off this whole "my OS is more secure than your OS" crap.
But, um, some OS'es *are* more secure than others.
Realize that you are vulnerable and take the correct steps to protect yourself.
I'm curious to know what "correct steps" you have in mind.
If it's "use an antivirus scanner", that's a retarded or at least suboptimal strategy, because antivirus scanners are of course imperfect (they'll never make you perfectly safe, either), and at any rate all they do is patch over the fact that an OS that needs them has a fundamentally flawed security model.
If it's "disable all the services you're not using", that's a pretty retarded strategy, too, because they should have been turned off by default, and the advice should really be phrased "don't enable anything you're not using."
For me, one of the biggest "correct steps" is, "use OS'es that take security seriously and have a decent security model". So of course I don't use Microsoft OS'es. I'm sorry if that's an example of the "my OS is more secure than your OS" crap, but really: it's at least as valid a strategy as "use an antivirus scanner".
Re:the Bottom Line (Score:3, Insightful)
You have a unique understanding of the phrase "just as." So because someone somewhere can get away with punching Mike Tyson in the face, Tyson is "just as" vulnerable as Pee-Wee Herman?
What no FUD tag already? (Score:2)
The technique would work on all popular OSes (Score:2, Interesting)
This is not a Mac/Windows/Linux/whatever issue. It is an OS architecture issue.
This exploit is yet another reason why drivers should be run in user space. I can't think of a popular OS that does this universally... Linux has nooks, which is not the same thing, and Vista is going to run some, but not all drivers as services instead of in the kernel. Network drivers have traditionally been run in kernel mode for the sake of performance... When is security going to trump performance as a design goal in the ma
And Apple scrapped Airport for Intel wireless,why? (Score:2)
Well... (Score:2)
Now that its been posted on Slashdot, there will be by the end of the day.
I don't believe it. (Score:3, Insightful)
I want to see this work on Linux, for that matter.
2. It requires your system to be setup to automatically associate with all non-password protected APs. This is not a default setting, either; and none of the Mac users I know run their systems on this setting.
People DO tend to run their systems on "Alert me to all unprotected wireless access points", but that's all.
I don't see why everyone is so willing to accept this vulnerability. Their talking about attacking Atheros drivers on Windows, Linux, and OS X, with at least three independent driver teams working on them, with the Linux one being opensource (Madwifi). Furthermore, I don't see how you would get the same three driver stacks to exhibit the same buffer overrun to root-level excutable code, particularly a locked down Linux.
It's not protecting anyone to hide this vulnerability. Releasing the information now would prove whether or not this is real, and would permit quick resolution to this problem, particularly for the MadWifi people.
Until there's more information, I don't believe it. Even if I did believe it, without any details there's no effective way for me to protect myself. If the attack requires associating with an AP, most systems are not vulnerable. If the attack simple requires scanning avaliable APs, then every system out there is vulnerable unless Wireless is entirely disabled. Either way, it's stupid not to release the details, and reeks of more "Mac's aren't safe! See! Buy Norton Antivirus for the Mac!".
Ha! I've done even better! (Score:3, Funny)
I disintegrated a car with my mind!
I have it on video!
Of course, I weakened the car's frame with a blowtorch... and the car was packed with explosives... and there was the whole "lit fuse" thing... but still! I disintegrated a car with my mind. Some anonymous guy with a video says so!
Security is your responsibility (Score:4, Interesting)
I have run windows machines since 3.1 and DOS before that and never had problem. On the other hand I have shown people (relatives, friends etc) how to secure and maintain their machines and the next week I find them back to doing their own self-defeating behaviours.
Someone found an exploit. Whoop-de-do. There will always be exploits found for all systems that people can screw with. There is almost always a way to secure against it. Almost always a large group of users ignores what is good for them and their machines and gets burned. Frankly, the platform matters less when it comes to these things than the user's behaviour.
Wake me when it's trivial and about the mac. (Score:3, Interesting)
on a MacBook of unknown status,
connecting to a specially scripted AP,
and get owner privileges.
Cuz this happens any time you use a Mac.
Oh, and thanks guys for the admonition about proper testing. We'll have to write that one down.
And for pointing out that wireless means there are no wires and you can sit in other chairs.
Hysterical inability to quantify risk (Score:5, Insightful)
Macs are so secure that A STORY about a third party wireless carded being hacked gets national-level coverage.
The PC owners rejoicing over the Mac's equivalence to their vulnerable platforms are being ridiculous. The quantifiable risk ratio between operating a Windows laptop and a MacBook is practically infinite, as there are no known virii for MacBooks, no known owning of MacBooks, no known security risks in operating a MacBook. At this point, hackers are well aware of a large installed userbase for Apple products, and certainly would attack them. If they could. Obviously they can't.
Silly people. Don't forget to run your virus and spyware checkers today. And back up your data, you never know when the bad guys will nail your hard drive in new and exciting ways through yet another buffer overflow in Windows.
Not Apple Wireless Hardware (Score:4, Insightful)
Note that if you research the article a bit, you'll find that the "researchers" didn't hack the MacBook through the built-in wireless adaptor [go.com], they actually used a 3rd party wireless card plugged into it. They did it on a Mac just for the publicity storm they hoped it would generate (and lookie here, they were right).
So all the crap about "Oh oh, now your Mac is just as insecure as a Windows Box" is really, well, wrong.
And researchers deserves the double-quotes in my opinion; anyone with a nickname like "Jonny Cache" seems a bit silly to me in the first place.
Attacking the wrong people (Score:3, Interesting)
These two "hackers" seem quite sheepish and frustrated. Why are they attacking the Mac user-base when it's not the users that are the problem?
One 'hacker' claims,We're not picking specifically on Macs here, but if you watch those 'Get a Mac' commercials enough, it eventually makes you want to stab one of those users in the eye with a lit cigarette or something,
Users? Why is he picking on users here? The people featured in these ads are ACTORS hired by the marketing and advertising departmens of Apple. Nothing at all to do with the user base.
"Mac userbase aura of smugness on security,"
I don't think the 'smugness aura' is generated by the user base. It's apple's marketing and PR that make claims of being secure and virus free. Do they really think that an average user would come up with something sercurity related on their own? No, they just regurgitate what they hear from these ads.
Maybe some day these guys will grow up socially and learn how to pick their battles. They are attacking the people that they should be trying to win over. They should instead of bringing the fight to the faceless corporations.
Re:How about warning the vendor. (Score:5, Informative)
Also, christ, I'd say they're being pretty responsible about it.
Re:How about warning the vendor. (Score:5, Informative)
Seeing you can't be bothered reading tfa to find out that they haven't discolsed & gone to some trouble to ensure the vulnerability's details weren't leaked, I'll quote the relevant sections for you:
and:
One last quote for you (just 'cause its funny):
Re:How about warning the vendor. (Score:2)
But they WERE given a huge helping hand here... They now know that a vulnerability exists, that it's possible on 3 different platforms, and that that it deals with wireless drivers in 'connect to anything' mode. Wow. If I had just a bit more ambition and a tad more skill, I'd be looking for that myself to
Re:How about warning the vendor. (Score:2)
Well, this is not quite
Re:Misconceptions by users (Score:2)
Re:Misconceptions by users (Score:5, Insightful)
BUT, and you'll notice this is a capital 'but', I have never seen a worm propagate across linux computers (I don't know for macs, I'm not a user of these). I mean, in the 98 era, windows computers were plagued with these. In the pre-SP1 era too. I have never seen a *single* self-propagating thingie for linux. The first one to do such a feat would get a lot of credit in the "scene" (if such a thing still exists). I, for one, believe that the security design of the OS is not stranger to this clean record.
Re:Misconceptions by users (Score:3, Informative)
What about the SSL worm from a couple of years back? I had at least one linux server rooted by that at the time.
Re:Misconceptions by users (Score:2)
Re:Misconceptions by users (Score:2)
Re:Misconceptions by users (Score:2, Informative)
Re:Driver vulnerabilities (Score:3, Informative)
Re:Centrino. Feh. (Score:5, Informative)
To be specific the new Macbooks/pros use a Atheros 5006x. This is in comparison to the powerbooks that use a broadcom based card. So Apple doesn't use Centrino.
Re:True? Or many want it to be true? (Score:5, Insightful)
Not actually demonstrating your methods while presenting them at a conference is pretty common in other disciplines where it's really hard to lug around an X-ray diffractometer or the New Guinea Urungwi tribe. In CS it's different, but I think the risk of interception is a pretty good excuse.
Re:True? Or many want it to be true? (Score:3, Insightful)
Actually, it's not uncommon in CompSci conferences to only present rigged demos. Most conference papers, however, are peer-reviewd before they are accepted[1]. One common question on the review forms is whether a
Re:Third party device (Score:2)
Headlines...