• Open Menu Close Menu
  • Apple
  • Shopping Bag
  • Apple
  • Mac
  • iPad
  • iPhone
  • Watch
  • TV
  • Music
  • Support
  • Search apple.com
  • Shopping Bag

Lists

Open Menu Close Menu
  • Terms and Conditions
  • Lists hosted on this site
  • Email the Postmaster
  • Tips for posting to public mailing lists
Re: I have a 0-day exploit, but don't want to tell you what it is
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: I have a 0-day exploit, but don't want to tell you what it is


  • Subject: Re: I have a 0-day exploit, but don't want to tell you what it is
  • From: Jens Alfke <email@hidden>
  • Date: Tue, 30 Jul 2013 14:31:21 -0700


On Jul 30, 2013, at 2:42 AM, Michael Crawford <email@hidden> wrote:

A while back, I stumbled across a way to root my own box by opening a
specially-crafted document with a widely-used program.

Do you literally mean that opening the document allows malicious code to run with root privileges? How is that possible when the app itself isn't running as root? (Yeah, the app might be using the Authorization APIs, but even those would require the user to enter their password before anything bad could happen.)

Of course, running malicious code "merely" with user privileges is bad enough. It's like that recent xkcd strip pointed out — it's perverse that the OS gives device drivers greater security than your email or your Facebook session, which are actually a lot more sensitive.

Rather than fixing just this one specially-crafted document exploit, I
propose to assist the community in fixing a great many exploits.

Great idea, but writing an email about debugging isn't going to fix a lot of apps. It might work better if you had a popular blog or ran well-attended seminars or something, but even that's not going to reach that many people, or make the ones it reaches much better programmers. Nothing personal; it's just unrealistic.

One small thing that I do think is having a significant effect is the security-related warnings in Clang, especially the ones that type-check printf-style format specifiers and that notice non-constant format strings. Apple once did an analysis of a whole bunch of OS X app vulnerabilities, and at least half of them stemmed from stupid mistakes with sprintf or +stringWithFormat:. (The Clang static analyzer is probably having a good effect too.)

—Jens
 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Xcode-users mailing list      (email@hidden)
Help/Unsubscribe/Update your Subscription:

This email sent to email@hidden

  • Follow-Ups:
    • Re: I have a 0-day exploit, but don't want to tell you what it is
      • From: Sean McBride <email@hidden>
References: 
 >I have a 0-day exploit, but don't want to tell you what it is (From: Michael Crawford <email@hidden>)

  • Prev by Date: Re: Getting poor stack traces
  • Next by Date: Symbolicating arbitrary crash logs
  • Previous by thread: Re: I have a 0-day exploit, but don't want to tell you what it is
  • Next by thread: Re: I have a 0-day exploit, but don't want to tell you what it is
  • Index(es):
    • Date
    • Thread