Feeds

Maynor reveals missing Apple flaw

And claims underhand play

The Power of One eBook: Top reasons to choose HP BladeSystem

Security researcher David Maynor got some measure of vindication at the Black Hat DC Conference this year. Six months after he and his colleague Jon Ellch claimed that Mac OS X wireless drivers were vulnerable to attack, Maynor on Wednesday revealed the code he used to exploit a native flaw in the platform as well as emails showing he notified Apple of the danger.

Maynor said the flaw was in the driver for the Broadcom wireless chip, the hardware under the hood of many MacBooks and PowerBooks.

In an email dated 9 August to Apple from his .Mac account, Maynor promised the company that his demo would not reveal the flaw in the native drivers, but in a third-party card, because the pair of researchers had not fully identified all the platforms affected by the Broadcom bug.

"Don't freak out," wrote Maynor, who is now the chief technology officer at startup Errata Security. "Although it is using a Mac, we are not sharing a native exploit. There are native exploits, but we are still determining how many other platforms are affected."

The flaw affected not only Mac OS X, but any platform that used drivers based on the Broadcom reference driver, he said. While MacBooks and PowerBooks were affected, so were Dell laptops running Windows XP. Apple fixed the flaw on September 21, but did not give Maynor or Ellch credit. The flaw could have allowed a remote attacker to compromise a vulnerable MacBook or PowerBook remotely via an overly long service set identifier (SSID), the label used to identify an access point.

Ellch was not present at the Black Hat DC Conference.

Apple did not immediately respond to requests for comment about the claims. However, in September, the company told reporters that the researchers did not send them information on the flaws, an assertion refuted by the email evidence shown by Maynor.

"They did not supply us with any information to allow us to identify a specific problem, so we initiated an internal audit," Apple spokesman, Anuj Nayar told Macworld. "Today's update preemptively strengthens our drivers against potential vulnerabilities, and while it addresses issues found internally by Apple, we are open to hearing from security researchers on how to improve security on the Mac."

The events underscored that the issues surrounding the disclosure of software flaws have not yet been hammered out. Apple has often been criticised by researchers for not working well with flaw finders.

The company is not the only one attempting to gag researchers: Another security researcher presenting on flaws in radio-frequency identification (RFID) proximity badges at the Black Hat DC Conference had to severely curtail his presentation, after security firm HID Global threatened possible legal action.

According to emails showed during Maynor's session, Apple's later assertions that he and Ellch shared no information with the company and that the researchers changed their story were both incorrect. On 15 August, Apple sent Maynor a blog entry to post on his site in his own name, disavowing the existence of any threat to Apple's laptops from the flaw, Maynor claimed. He showed an email from Apple to his .Mac account that supported the allegations.

Maynor and Ellch refused to talk about the issue because Apple had gagged the researchers by brandishing legal threats at Maynor's previous employer SecureWorks, the researcher said.

"Apple released patches, while at the same time threatening SecureWorks with a lawsuit," he said.

Apple likely made the mistakes out of a lack of experience in dealing with security issues, said Jeff Moss, director of the Black Hat Conference.

"It seems to be the new players who have no experience are causing the problems," Moss said. "Apple is where Microsoft was six years ago. At this point, they don't even have a CSO (chief security officer)."

For his part, Maynor plans to continue researching Apple flaws, but will no longer report the issues to the company.

"I no longer feel comfortable engaging in any type of relationship with the company and I will not report any future findings to them," Maynor said.

Maynor plans to post all of the documents and personal correspondence with Apple on Errata Security's blog.

This article originally appeared in Security Focus.

Copyright © 2007, SecurityFocus

Designing a Defense for Mobile Applications

More from The Register

next story
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.