Feeds

Maynor reveals missing Apple flaw

And claims underhand play

Security for virtualized datacentres

Security researcher David Maynor got some measure of vindication at the Black Hat DC Conference this year. Six months after he and his colleague Jon Ellch claimed that Mac OS X wireless drivers were vulnerable to attack, Maynor on Wednesday revealed the code he used to exploit a native flaw in the platform as well as emails showing he notified Apple of the danger.

Maynor said the flaw was in the driver for the Broadcom wireless chip, the hardware under the hood of many MacBooks and PowerBooks.

In an email dated 9 August to Apple from his .Mac account, Maynor promised the company that his demo would not reveal the flaw in the native drivers, but in a third-party card, because the pair of researchers had not fully identified all the platforms affected by the Broadcom bug.

"Don't freak out," wrote Maynor, who is now the chief technology officer at startup Errata Security. "Although it is using a Mac, we are not sharing a native exploit. There are native exploits, but we are still determining how many other platforms are affected."

The flaw affected not only Mac OS X, but any platform that used drivers based on the Broadcom reference driver, he said. While MacBooks and PowerBooks were affected, so were Dell laptops running Windows XP. Apple fixed the flaw on September 21, but did not give Maynor or Ellch credit. The flaw could have allowed a remote attacker to compromise a vulnerable MacBook or PowerBook remotely via an overly long service set identifier (SSID), the label used to identify an access point.

Ellch was not present at the Black Hat DC Conference.

Apple did not immediately respond to requests for comment about the claims. However, in September, the company told reporters that the researchers did not send them information on the flaws, an assertion refuted by the email evidence shown by Maynor.

"They did not supply us with any information to allow us to identify a specific problem, so we initiated an internal audit," Apple spokesman, Anuj Nayar told Macworld. "Today's update preemptively strengthens our drivers against potential vulnerabilities, and while it addresses issues found internally by Apple, we are open to hearing from security researchers on how to improve security on the Mac."

The events underscored that the issues surrounding the disclosure of software flaws have not yet been hammered out. Apple has often been criticised by researchers for not working well with flaw finders.

The company is not the only one attempting to gag researchers: Another security researcher presenting on flaws in radio-frequency identification (RFID) proximity badges at the Black Hat DC Conference had to severely curtail his presentation, after security firm HID Global threatened possible legal action.

According to emails showed during Maynor's session, Apple's later assertions that he and Ellch shared no information with the company and that the researchers changed their story were both incorrect. On 15 August, Apple sent Maynor a blog entry to post on his site in his own name, disavowing the existence of any threat to Apple's laptops from the flaw, Maynor claimed. He showed an email from Apple to his .Mac account that supported the allegations.

Maynor and Ellch refused to talk about the issue because Apple had gagged the researchers by brandishing legal threats at Maynor's previous employer SecureWorks, the researcher said.

"Apple released patches, while at the same time threatening SecureWorks with a lawsuit," he said.

Apple likely made the mistakes out of a lack of experience in dealing with security issues, said Jeff Moss, director of the Black Hat Conference.

"It seems to be the new players who have no experience are causing the problems," Moss said. "Apple is where Microsoft was six years ago. At this point, they don't even have a CSO (chief security officer)."

For his part, Maynor plans to continue researching Apple flaws, but will no longer report the issues to the company.

"I no longer feel comfortable engaging in any type of relationship with the company and I will not report any future findings to them," Maynor said.

Maynor plans to post all of the documents and personal correspondence with Apple on Errata Security's blog.

This article originally appeared in Security Focus.

Copyright © 2007, SecurityFocus

Beginner's guide to SSL certificates

More from The Register

next story
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.