Feeds

Apple Safari, Mail and more hit by SSL spying bug on OS X, fix 'soon'

iMessage, Facetime, Twitter and others blown apart by Apple's cert check cock-up

Internet Security Threat Report 2014

Apple has admitted a bug in Mac OS X 10.9.1 allows hackers to intercept and decrypt SSL-encrypted network connections – and has promised to release a fix "very soon."

Sensitive information, such as bank card numbers and account passwords, sent over HTTPS, IMAPS and other SSL-protected channels from vulnerable Mac computers could easily end up in the hands of snoopers as a result of this security hole.

The Cupertino giant issued updates for versions 7 and 6 of its mobile operating system iOS on Friday to address the same flaw in iPhones, iPads and iPods.

But it quickly became apparent that the vulnerability also exists in desktop and laptop computers running Mac OS X Mavericks, the latest public release of Apple's desktop OS.

The security hole was created by a trivial programming cock-up, which causes Apple's SSL/TLS library to skip over vital verification checks of a server's authenticity when establishing a connection.

A malicious router, Wi-Fi access point or other man-in-the-middle system could exploit this to silently masquerade as a legit website or online service, and thus intercept, read and tamper with the private contents of a victim's supposedly secure connection.

Apple's Safari web browser and Mail client running on OS X 10.9.1 are vulnerable to SSL snoopers because they rely on the broken crypto-library; other Cupertino apps such as Facetime and iMessage, and third-party programs using Apple's crocked code, are all faulty as well. Google Chrome and Mozilla Firefox are not vulnerable because they don't use the busted SSL library.

Tech-savvy users can use the otool command-line utility to determine whether an application is vulnerable by inspecting the libraries it loads. Apple's broken SSL library is version 55471, so grepping for that number from otool's output will reveal whether the program is using the knackered Security framework. For example...

otool -L `which ssh` | grep 55471

...produces no results because Apple's SSH (which declares itself to be SSH-2.0-OpenSSH_6.2) uses version 55456 of Apple's Security framework library. Unfortunately, several apps are using version 55471:

"We are aware of this issue and already have a software fix that will be released very soon," Apple spokeswoman Trudy Muller told Reuters this weekend regarding the SSL certificate validation bug in OS X 10.9.1.

Meanwhile, someone's set up a website called gotofail.com, a reference to the C code bug at the heart of the problem, so that users can check whether their web browsers running on OS X 10.9.1 are vulnerable. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.