With the iCal security controversy still echoing, a different issue, this time involving Apple's browser, is ratcheting up the hype, with Microsoft publicly stating that Windows users should avoid the application until a patch is produced.
The Safari carpet bomb attack (ZDNet, May 15) isn't a vulnerability per se, only serious annoyance and not a way for an attacker to take over a computer. As of this writing, a "rogue website" could cause hundreds of files to be downloaded to a user's desktop or downloads folder.
Apple isn't concerned and has said they're not going to patch the issue any time soon. Others are demanding action.
Those demands didn't get much attention until yesterday, that is, when Microsoft issued an advisory (The Register) to Windows users saying that they should avoid Safari until the issue is addressed by either Redmond or Apple.
Although there's isn't an attack vector, Microsoft is concerned that should one be developed, a user could find himself deluged under a barrage of hundreds of simultaneously executing files. Alternately, Microsoft could be making a point about how seriously they take "security" as opposed to Apple.
Still, the nut of the issue, according to security expert Nitesh Dhanjani (ZDNet), is this:
It is possible for a rogue website to litter the userís Desktop (Windows) or Downloads directory (~/Downloads/ in OSX). This can happen because the Safari browser cannot be configured to obtain the userís permission before it downloads a resource. Safari downloads the resource without the userís consent and places it in a default location (unless changed).
Apple won't create a tick box. That's the point. But, users almost universally ignore tick boxes and Apple's choosing to go with the "wisdom of the crowd," which is all well and fine until an actual attack vector appears and those hundreds of downloads begin executing (and we actually need that tick box).
Then again, no one seems to be discussing the probability of anyone creating such a vector (Are we talking about toddlers randomly combining pieces of code or would it require a multi-year NSA skunkworks project to get it done?).
[u] For Windows users, at least, an attack vector for the "carpet bombing" vulnerability now exists. A so-called "blended attack," requires that a user have both Internet Explorer and Safari installed.
Here's the dope from Aviv Raff:
This combined Safari/IE vulnerability might still be successfully exploited, even if the user will change Safari's download location. Also, the Safari "Carpet Bomb" vulnerability can be used in combination with vulnerabilities in other products, so even if MS fixes their vulnerability,† Safari users will still be vulnerable ... The current best solution is to stop using Safari until Apple fixes their vulnerability. [u]
But, wait, isn't the lack of a real or likely attack vector one of the bitter issues between Apple and Core Securities vis-a-vis iCal? Yup.
The signal to noise to echo ratio is getting absurd...
No DRM, No Restrictions, No Problem!
- Podcast: End of Macworld Expo? Mac Hack, Jobs movie + more
- Tool and guides emerge to upgrade older Macs for Yosemite Continuity/Handoff
- Google Inbox
- Memory upgrades for new 5K iMac from Other World Computing
- Dropbox adds iPhone 6/6+, Touch ID support
- Video: How to charge your iPhone 6 faster
- Apple announces iPad Air 2, iPad mini 3
- Apple announces new iMac with 5K display
- OS X Yosemite launches
- Apple updates Mac mini
- Apple Pay goes live October 20
- HBO plans to launch stand-alone streaming service next year
- Macworld/iWorld called off for 2015
- Podcast - Apple Event, iOS 8 Adoption + More
- New Apple event set for October 16th
- Fitbit says not working on iOS 8 Health integration
- 1Password Update for iOS 8 Bugs
- T-Mobile CEO Legere on Bendgate
- Podcast: Verizon Plans, Windows 10, Apple QA, plus much more
- Apple Activation Lock Status website
- Vogue Profiles Ive
- Verizon promotion boosts shared data plans
- Bendgate helps Apple?
- Consumer Reports takes on iPhone bending
- A look at making launch day iPhone cases
Browse and search for more articles