Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Businesses Apple

MacBook Hacked In Contest Via Zero-Day Hole in Safari 156

EMB Numbers writes "Shane Macaulay just won a MacBook as a prize for successfully hacking OS X at CanSecWest conference in Vancouver, BC. The hack was based on a Safari vulnerability found by Dai Zovi and written in about 9 hours. CanSecWest organizers actually had to relax the contest rules to make the hack possible, because initially nobody at the event could breach the computers under the original restrictions. 'Dai Zovi plans to apply for a $10,000 bug bounty TippingPoint announced on Thursday if a previously unknown Apple bug was used. "Shane can have the laptop, I want the money," Dai Zovi said in a telephone interview from New York. TippingPoint runs the Zero Day Initiative bug bounty program.'"
This discussion has been archived. No new comments can be posted.

MacBook Hacked In Contest Via Zero-Day Hole in Safari

Comments Filter:
  • Konqueror (Score:5, Interesting)

    by Anonymous Coward on Saturday April 21, 2007 @01:40AM (#18821437)
    Safari's rendering engine is based on KHTML. So is Konqueror affected by this flaw as well?
  • Re:Konqueror (Score:2, Interesting)

    by Fooker ( 656693 ) on Saturday April 21, 2007 @01:47AM (#18821483)
    Thats a good question. There's a good chance it could be. Then again with the speed that updates/patch's/fix's come out for Linux, if it does it'll be fixed in a relatively short time.
  • by goombah99 ( 560566 ) on Saturday April 21, 2007 @02:44AM (#18821741)
    I wish they would say if the user that safari was running under was admin or regular. If it was admin then this is even less of a hack than it already is. Also I wonder if they disabled the safari feature to automatically "open safe files after downloading". That option puts a lot of trust in other programs not to have holes. indeed it's not really safe at all. Only stupid people or people that don't do stupid things leave it on.

    Bottom line no remote hacks.
  • So not the OS then! (Score:1, Interesting)

    by Goth Biker Babe ( 311502 ) on Saturday April 21, 2007 @02:48AM (#18821763) Homepage Journal
    So they couldn't get in directly and had to use a hole in an Application. Just remind me how many holes have IE and Firefox had in the past?

    OS-X is essentially BSD with a second layer on the top being the frameworks from Next and Apple and the applications. If they find vunerabilities in the lowest layer of code then Linux is in trouble too because there's an awful lot of shared code there. Anyone remember the ssh hole which allowed you to root a box? So the issue would be in the Apple provided layers.

    As anyone who has designed, or worked at a high level, on a complete system knows you design as much as you like and you can use defensive coding as much as you can but there will always be edge cases and unfortunately the only way to find them is when something breaks or is broken. Then what you must do is fix them asap and not do what a certain OS company does is first deny they exist, then admit they exist and say it will be patched, and then finally release a patch some months later. Having said that they have been a bit better lately.

    I get anoyed at people saying how secure OS-X is or Linux or what ever. There is no one true OS. All this my macho my OS is better that your OS pisses me off. People use different OSs because of the applications they want to use and their working style.

    I have several requirements for my personal laptop (compared to my office one). It must be small and lightweight, easy to use, manage my arty hobbies (films, photography, music and other media), but also allow me to do my consultancy work if needed which is mainly *NIX development (C, C++ and Java) and writing reports, feasibility studies and the like. I don't play games that much and I have consoles for that (although since I now travel a lot a DS may be appear in my purse in the near future). So I have a Mac. It does all that I need.

    I could use my works Dell but having to occasionally reboot from Linux in to XP and back again would anoy the hell out of me. Also its huge.
  • by Animaether ( 411575 ) on Saturday April 21, 2007 @04:47AM (#18822115) Journal
    ...is there?

    I mean - I can only assume this was a 'white hat' hackers conference, given there was actual publicity given and a public bounty and such. But then things like these pop up?

    "'Shane can have the laptop, I want the money,' Dai Zovi said in a telephone interview from New York"
    "Conference attendees were underwhelmed, reasoning a Mac exploit that required no end-user interaction could be sold for upwards of $20,000."


    Makes me think.. black hat, white hat.. what's the difference these days? I thought a white hat hacker was the 'good guy' (albeit still a hacker).. the kind of person who hacks for fun / curiosity.. the kind of person who notifies the developer of the bug or, at least, just makes the bug known to the world at no charge. Not the kind of person who hacks, then scours the 'security conferences' for a bounty, and when that bounty is lower than what they could get off of actual 'bad guys', complain that the bounty is too low. To me, that just sounds like the person is a black hat, but dons a white hat on top in an attempt to fool us into thinking they're white hat.
  • by Tickletaint ( 1088359 ) on Saturday April 21, 2007 @08:12AM (#18822895) Journal
    Interesting that your sig:

    You are coming to a sad realization. Cancel or allow?
    skewers that very behavior of Safari you describe [third-design.net]. Of course, if you have "open safe files after downloading" turned off, it's even more obnoxious—you have to find the file on your desktop and open it manually. Exactly the sort of repetitive task I thought my computer should be doing on my behalf.
  • Re:Konqueror (Score:2, Interesting)

    by Tickletaint ( 1088359 ) on Saturday April 21, 2007 @08:34AM (#18822985) Journal
    Why say "Linux" rather than open source? KHTML has nothing to do with Linux. Anyway, from what I've been reading, it seems more likely related to a bug in JavaScriptCore [webkit.org], derived from KJS and which is also open source.

    By the way—

    updates/patch's/fix's
    Should be "update's," for consistency.
  • What I want to know (Score:4, Interesting)

    by HairyCanary ( 688865 ) on Saturday April 21, 2007 @11:37AM (#18824073)
    How was the machine configured relative to an off-the-shelf OSX installation?

    While I understand that for the purposes of the contest it might have been necessary to reduce those protections, I think that before something becomes "news" we should know what the real risk is.

    Does this hack require the user to manually disable protections the OS ships with, or manually enable services that default to off? The article seems light on detail.

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...