>Message: 6 >Date: Sun, 26 Feb 2006 10:46:12 -0600 >From: Chris Olson <chris.olson at astcomm.net> >Subject: Re: [OT] [Ti] Intel Mac Mini? now Security >To: "A place to discuss Apple's Titanium computers." > <titanium at listserver.themacintoshguy.com> >Message-ID: <2E48DC3B-92F2-49CD-8B39-DCCBFBBFAB2B at astcomm.net> >Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed > >On Feb 26, 2006, at 8:16 AM, Tarik Bilgin wrote: > > > >>Chris I grant you that OS X is now seeing the kind of "battle >>hardening" that Windows has seen over the last 10 years. But for me >>at least, the discovery of some trojans and worms possible in OS X >>does not mean the sky is falling, but that yes sadly there are bugs >>in OS X. >> >> > >I don't believe I said the sky is falling. Just that Mac OS X is >just as exploitable as Windows. > > > >>When I do a default install of OS X, I am running as a user with >>the potential to have administrator level privileges but my >>password is validated before making any major change like >>installing software. >> >> > >This is a common misconception. Your demo of our fully-developed >exploit is on its way to you via private email, and I think some >things should be pointed out, for the benefit of others running OS X >as well: > >1.) If you're an admin user on OS X (meaning you can authenticate to >install root-level software), you are at greater danger. The reason >is because you belong to the BSD admin group. This means you have >read/write access to root level directories, WITHOUT having to >authenticate. > >2.) Mac OS X's software bundles are self-contained. Inside the >bundle they contain their own libraries, etc.. This means a hacker >does NOT have to have root level access to run arbitrary code on your >system because software on Mac OS X can be run directly from a Disk >Image, or anywhere in your user account. > >3.) To fully realize the extend of what can be done, take a good >look at the demo I sent you. You'll see that you CAN NOT see the >actual program that does the damage in Finder, aka the proof-of- >concept demos on the web. I dropped a trojan (a program) into your >user account without you even knowing it. I can set cron jobs to run >it at arbitrary times, I can add it to your login items and keep it >hidden, or any number of things. And you'll never find it short of >dropping to the Unix command line, and then you'll have to know what >you're looking for. > >4.) In light of the above, I can install hidden key loggers, network >sniffers, or any number of malicious programs into your user account, >run them under your user privileges, have the program open a back >door (from inside your firewall), and retrieve your administrator >password. Bingo - I got root on your computer. The rest is history. > > Chris, what do you suggest we do to prevent an attack like this from happening?