Mac OS X Exploit Rapidly Follows Patch

Mac OS X Exploit Rapidly Follows Patch
Mac OS X Exploit Rapidly Follows Patch,1895,2138304,00.asp 

By Brian Prince
May 29, 2007

Security research firm Immunity released exploit code for a serious bug 
affecting Mac OS X less than 24 hours after Apple released a patch for 

The flaw is a buffer overflow vulnerability in the UPnP Internet Gateway 
Device Standardized Device Control code used to create port mappings on 
home NAT (Network Address Translation) gateways in the OS X 
mDNSResponder implementation.

Apple issued a patch for the vulnerability late in the week of May 21. 
The flaw, one of 17 security issues addressed by the company in the 
update, could lead to the remote execution of code. It affects Mac OS X 
v10.4.9 and Mac OS X Server v10.4.9.

The exploit was made available on May 25, less than 24 hours later, to 
members of Immunity's partner program.

"So essentially [it's] a reliable remote root on everyone at Starbucks 
or on all those OS X fiends at security conventions," Dave Aitel, chief 
technology officer for Immunity, based in Miami, wrote in a posting 
about the exploit. "The Immunity exploit will do so on either PPC or 
Intel, your pick, and since the service restarts, you get to pick 

Jose Nazario, a software and security engineer at Arbor Networks, based 
in Lexington, Mass., said it was unusual for an exploit of a Mac 
vulnerability to be released so quickly.

"I don't know of any others that have been quite that fast, within a day 
or two," Nazario said, adding that Mac OS X has increasingly become a 
source of interest for hackers and security researchers alike.

Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. 

Site design & layout copyright © 1986-2014 CodeGods