With the iCal security controversy still echoing, a different issue, this time involving Apple's browser, is ratcheting up the hype, with Microsoft publicly stating that Windows users should avoid the application until a patch is produced.
The Safari carpet bomb attack (ZDNet, May 15) isn't a vulnerability per se, only serious annoyance and not a way for an attacker to take over a computer. As of this writing, a "rogue website" could cause hundreds of files to be downloaded to a user's desktop or downloads folder.
Apple isn't concerned and has said they're not going to patch the issue any time soon. Others are demanding action.
Those demands didn't get much attention until yesterday, that is, when Microsoft issued an advisory (The Register) to Windows users saying that they should avoid Safari until the issue is addressed by either Redmond or Apple.
Although there's isn't an attack vector, Microsoft is concerned that should one be developed, a user could find himself deluged under a barrage of hundreds of simultaneously executing files. Alternately, Microsoft could be making a point about how seriously they take "security" as opposed to Apple.
Still, the nut of the issue, according to security expert Nitesh Dhanjani (ZDNet), is this:
It is possible for a rogue website to litter the userís Desktop (Windows) or Downloads directory (~/Downloads/ in OSX). This can happen because the Safari browser cannot be configured to obtain the userís permission before it downloads a resource. Safari downloads the resource without the userís consent and places it in a default location (unless changed).
Apple won't create a tick box. That's the point. But, users almost universally ignore tick boxes and Apple's choosing to go with the "wisdom of the crowd," which is all well and fine until an actual attack vector appears and those hundreds of downloads begin executing (and we actually need that tick box).
Then again, no one seems to be discussing the probability of anyone creating such a vector (Are we talking about toddlers randomly combining pieces of code or would it require a multi-year NSA skunkworks project to get it done?).
[u] For Windows users, at least, an attack vector for the "carpet bombing" vulnerability now exists. A so-called "blended attack," requires that a user have both Internet Explorer and Safari installed.
Here's the dope from Aviv Raff:
This combined Safari/IE vulnerability might still be successfully exploited, even if the user will change Safari's download location. Also, the Safari "Carpet Bomb" vulnerability can be used in combination with vulnerabilities in other products, so even if MS fixes their vulnerability,† Safari users will still be vulnerable ... The current best solution is to stop using Safari until Apple fixes their vulnerability. [u]
But, wait, isn't the lack of a real or likely attack vector one of the bitter issues between Apple and Core Securities vis-a-vis iCal? Yup.
The signal to noise to echo ratio is getting absurd...
No DRM, No Restrictions, No Problem!
- Bendgate helps Apple?
- Consumer Reports takes on iPhone bending
- A look at making launch day iPhone cases
- Podcast: Thoughts on iPhone 6/6+, Hot Thighs and Tights Pants, What's Wrong with iPhone Lines
- How to get photos on to iOS 8 iCloud Photo Library with PhotoSync
- iPhone launch weekend sees 10 million sold
- Thoughts on iPhone sizes
- Apple TV and HomeKit
- iPhone lines and the black market
- Podcast - iPhone pre-orders, iOS 8, Tim Cook Interview + More
- 1Password 5 now available for iOS w/ extensions, touch ID support
- iCloud data gets 2-step verification, new app-specifc passwords
- Apple posts Android switcher guide
- Charlie Rose Tim Cook Interview
- 4 million iPhone orders in first day, up from 2 million for iPhone 5
- Podcast: iPhone 6, Watch, Apple Pay, etc, etc
- New iCloud storage plans rolling out
- Macworld Magazine ends, continues online
- Apple Watch
- The iPhone 6 and 6 Plus
- Apple Pay
- Podcast: iCloud security tips, TheFappening, Apple Event, plus more
- Wired on how iCloud accounts may have been hacked
- My iCloud security tips
- Podcast: Brown M&M, Apple event, wearable, tattoos, Dropbox vs iCloud + More
Browse and search for more articles