Feeds

Apple TV gets its first critical security patch

Flaw made it possible to remotely access home networks

Mobile application security vulnerability report

Apple has patched a security hole in its Apple TV box that made it possible for remote hackers to access a user's network and spy on traffic passing through it.

The flaw, which was patched in an update Apple released today, is the same vulnerability that plagued OS X until Apple released an update late last month.

It resides in a technology dubbed UPnP IGD (Internet Gateway Device Standardized Device Control Protocol), which is used to map ports on home networks. Problem is, a miscreant can bring about a buffer overflow by sending a maliciously crafted packet, making it possible to execute arbitrary code.

We were at first inclined to believe that being able to execute code on a device as limited as the Apple TV was little more than a oddity. But Dave Aitel, CTO of security research firm Immunity, says the machine's connection to home networks makes the flaw serious.

"If we get control of the Apple TV machine then anything that passes next to the Apple TV machine I can see," he explains. "Certainly, there's a lot of bad things you can do with access to their local network."

The ability to root around inside the Apple TV could also have serious implications down the road if, as many predict the device becomes a platform for buying or renting video.

Apple TVs are programmed to download and install any available patches once per week. That means the machines should automatically update within the next seven days. Those, like us, who prefer to receive critical patches a bit more quickly can manually install the fix by choosing Update Software from Apple TV's preference menu.

If the past six months are any indication, 2007 may go down as the year Apple's security team was exposed as mere mortals, rather than the demigods portrayed by Apple's marketing monkeys. Last week, the company introduced a bug-riddled test version of the Safari browser for Windows. In additional to numerous crashes, the beta contained at least three holes that made it possible for machines to get owned when Safari visited booby-trapped websites. To its credit, Apple patched the flaws just three days later. The company has plugged serious holes in other major products this year, including OS X and QuickTime.

While it's true the Apple TV flaw fixed today represented a serious potential privacy and security breach, it also opened up the possibility for more benign mischief.

By exploiting the flaw, "I can watch TV for them or I can display One Night in Paris instead," Aitel postulates, referring to the steamy Paris Hilton video. ®

This story was updated to correct the title of Dave Aitel.

Boost IT visibility and business value

More from The Register

next story
Report: American tech firms charge Britons a thumping nationality tax
Without representation, too. Time for a Boston (Lincs) Macbook Party?
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Apple gets patent for WRIST-PUTER: iTime for a smartwatch
It does everything a smartwatch should do ... but Apple owns it
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.