A Mac gets whacked, a second survives
CanSecWest PWN to Own contest beaten
Shane Macaulay strode into the conference hall at the CanSecWest conference on Friday afternoon, balancing a MacBook Pro on his palm and making a beeline for the table displaying two more of the silver laptops.
The well-known security researcher had just spent the morning testing an exploit designed to take advantage of a vulnerability in Apple's Safari browser. He set down his MacBook, connected to the network and started up a web server from which he would host the attack. A conference staff member entered a URL into the Safari browser running on the target machines and, just like that, Macaulay took control of the machine and became the first winner of the CanSecWest conference's PWN to Own contest.
With the hack, Macaulay laid claim to one of two MacBook Pros offered up as a prize to the anyone who could compromise them. While the flaw required some user interaction, the conference organisers, as well as every security researcher interviewed for this article, ranked the vulnerability as a critical flaw and a real threat.
"This is more realistic," Macaulay said of the exploit. "Everyone is going to be behind a router, so you are not going to have a chance to use a fully remote exploit."
The flaw threatens everyone running the Mac OS X, even after applying a patch that Apple released on Thursday.
The user-level exploitation of the MacBook ended the a day-long wait for a security researcher that would part with a remote zero-day flaw to exploit the Mac OS X. Yet, most researchers did not even consider attempting the feat until TippingPoint, the security division of networking giant 3Com, sweetened the pot with an offer to buy the winning exploit for $10,000, a figure that is more in line with the value of vulnerability information.
Macaulay would not see the money, however. More than 2,000 miles away, the flaw's actual discoverer, Dino Dai Zovi, had laid claim to the cash as part of a deal with Macaulay.
Reached by phone, Dai Zovi sounded tired. Macaulay had called the former security researcher - now a security manger at a financial firm whose name he was unwilling to disclose - on Thursday night and asked if he had the time to find a flaw that could compromise the fully-patched MacBooks. The deal would be simple: Macaulay would get the MacBook, Dai Zovi the cash.
At about 10 pm, the New York City-based security expert sat down and started looking in likely places for a serious bug that could satisfy the challenge. Several months ago, he had done some poking around the Mac OS X's operating system and applications looking for vulnerabilities and found a few promising places in the software that could hide flaws, Dai Zovi said. Checking the suspect code early Friday morning, Dai Zovi discovered a single flaw.
"I only found one," he said. "But by later that morning, I had a working exploit."
Despite their success, Dai Zovi and Macaulay are not maintaining that the Mac OS X is any more or less secure than, say, a Windows Vista system or some variant of Unix. While Macaulay uses a MacBook installed with Windows Vista, Dai Zovi considers himself a Mac fanboy and uses Macs regularly. The contest just shows that Mac users have to worry about vulnerabilities just as much as other computer users, Dai Zovi said. It's a fact of life with which all security experts are familiar, but to which some Mac users seem resistant.
"It works. It is real. This is not something that I have made up," Dai Zovi said. "It seems that a lot of people harbour the belief that the Mac doesn't have these problems, but it does."
Sponsored: RAID: End of an era?