Feeds

Apple Safari, Mail and more hit by SSL spying bug on OS X, fix 'soon'

iMessage, Facetime, Twitter and others blown apart by Apple's cert check cock-up

SANS - Survey on application security programs

Apple has admitted a bug in Mac OS X 10.9.1 allows hackers to intercept and decrypt SSL-encrypted network connections – and has promised to release a fix "very soon."

Sensitive information, such as bank card numbers and account passwords, sent over HTTPS, IMAPS and other SSL-protected channels from vulnerable Mac computers could easily end up in the hands of snoopers as a result of this security hole.

The Cupertino giant issued updates for versions 7 and 6 of its mobile operating system iOS on Friday to address the same flaw in iPhones, iPads and iPods.

But it quickly became apparent that the vulnerability also exists in desktop and laptop computers running Mac OS X Mavericks, the latest public release of Apple's desktop OS.

The security hole was created by a trivial programming cock-up, which causes Apple's SSL/TLS library to skip over vital verification checks of a server's authenticity when establishing a connection.

A malicious router, Wi-Fi access point or other man-in-the-middle system could exploit this to silently masquerade as a legit website or online service, and thus intercept, read and tamper with the private contents of a victim's supposedly secure connection.

Apple's Safari web browser and Mail client running on OS X 10.9.1 are vulnerable to SSL snoopers because they rely on the broken crypto-library; other Cupertino apps such as Facetime and iMessage, and third-party programs using Apple's crocked code, are all faulty as well. Google Chrome and Mozilla Firefox are not vulnerable because they don't use the busted SSL library.

Tech-savvy users can use the otool command-line utility to determine whether an application is vulnerable by inspecting the libraries it loads. Apple's broken SSL library is version 55471, so grepping for that number from otool's output will reveal whether the program is using the knackered Security framework. For example...

otool -L `which ssh` | grep 55471

...produces no results because Apple's SSH (which declares itself to be SSH-2.0-OpenSSH_6.2) uses version 55456 of Apple's Security framework library. Unfortunately, several apps are using version 55471:

"We are aware of this issue and already have a software fix that will be released very soon," Apple spokeswoman Trudy Muller told Reuters this weekend regarding the SSL certificate validation bug in OS X 10.9.1.

Meanwhile, someone's set up a website called gotofail.com, a reference to the C code bug at the heart of the problem, so that users can check whether their web browsers running on OS X 10.9.1 are vulnerable. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.