A researcher has published details of how he and a colleague broke into a MacBook via a flaw in its wireless drivers at Black Hat last year.

Errata Security Chief Technology Officer David Maynor published the details in an article in the September issue of Uninformed, an online security research magazine.

The situation got weird between the researchers—Maynor and independent security researcher Jon Ellch—and Apple after the two demonstrated the break-in at Black Hat in August 2006. The duo used an Apple MacBook laptop fitted with a wireless card that was broadcasting its presence to another computer set up as an access point at the security show.

Apple initially denied that the flaw affected its products. It then gave itself credit for finding the bug through an internal audit, altogether dropping from the reporting credits mention of either the researchers or SecureWorks, the company that claimed ownership of the vulnerability details.

Apple is one of the top vendors when it comes to publicly disclosed vulnerabilities. Read more here.

News reports quote Maynor as saying that the reason the exploit details are coming to light at this time is that until now he under a nondisclosure agreement that kept him from revealing the details. He has declined to say who the NDA is with.

As for the paper, Maynor said in the conclusion that it presents merely a quick walk-through of the vulnerability in terms of discovery and exploitation, but that's just one part of an exploit. "To do something useful, an attacker needs kernel-mode shellcode," he said—the subject of a future paper.

The exploit discussed in the paper is just a proof of concept, Maynor said, given that an exploit writer still needs the load address of the kernel module on the target machine.

But this "is a choice, not a restriction," Maynor writes, and weaponizing an exploit is simple.

"This method of gaining execution is well-suited to a proof of concept," he said. "Creation of a weaponized exploit that can execute arbitrary code with no prior knowledge is just as easy. It's just a matter of overwriting different parts of the kernel."

Check out eWEEK.com's Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK's Security Watch blog.

Copyright (c) 2007 Ziff Davis Media Inc. All Rights Reserved.
September 20, 2007
By  Lisa Vaas
http://www.eweek.com/print_article2/0,1217,a=215565,00.asp
arrow
arrow
    全站熱搜
    創作者介紹
    創作者 ivan0914 的頭像
    ivan0914

    I'n Blog 之萬象真藏

    ivan0914 發表在 痞客邦 留言(0) 人氣()