Feeds

Apple TV gets its first critical security patch

Flaw made it possible to remotely access home networks

Top 5 reasons to deploy VMware with Tegile

Apple has patched a security hole in its Apple TV box that made it possible for remote hackers to access a user's network and spy on traffic passing through it.

The flaw, which was patched in an update Apple released today, is the same vulnerability that plagued OS X until Apple released an update late last month.

It resides in a technology dubbed UPnP IGD (Internet Gateway Device Standardized Device Control Protocol), which is used to map ports on home networks. Problem is, a miscreant can bring about a buffer overflow by sending a maliciously crafted packet, making it possible to execute arbitrary code.

We were at first inclined to believe that being able to execute code on a device as limited as the Apple TV was little more than a oddity. But Dave Aitel, CTO of security research firm Immunity, says the machine's connection to home networks makes the flaw serious.

"If we get control of the Apple TV machine then anything that passes next to the Apple TV machine I can see," he explains. "Certainly, there's a lot of bad things you can do with access to their local network."

The ability to root around inside the Apple TV could also have serious implications down the road if, as many predict the device becomes a platform for buying or renting video.

Apple TVs are programmed to download and install any available patches once per week. That means the machines should automatically update within the next seven days. Those, like us, who prefer to receive critical patches a bit more quickly can manually install the fix by choosing Update Software from Apple TV's preference menu.

If the past six months are any indication, 2007 may go down as the year Apple's security team was exposed as mere mortals, rather than the demigods portrayed by Apple's marketing monkeys. Last week, the company introduced a bug-riddled test version of the Safari browser for Windows. In additional to numerous crashes, the beta contained at least three holes that made it possible for machines to get owned when Safari visited booby-trapped websites. To its credit, Apple patched the flaws just three days later. The company has plugged serious holes in other major products this year, including OS X and QuickTime.

While it's true the Apple TV flaw fixed today represented a serious potential privacy and security breach, it also opened up the possibility for more benign mischief.

By exploiting the flaw, "I can watch TV for them or I can display One Night in Paris instead," Aitel postulates, referring to the steamy Paris Hilton video. ®

This story was updated to correct the title of Dave Aitel.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
Disturbance in the force lets phones detect gestures with Wi-Fi
These are the movement detection devices you're looking for
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?