El día 20 de abrial apareció la noticia de que un hacker había ganado un premio 10.000 $ al lograr romper la seguridad de un Mac con OSX durante una conferencia sobre seguridad (http://cansecwest.com).
http://www.macworld.com/news/2007/04/20/machack/index.php
http://www.theinquirer.net/default.aspx?article=39093
http://arstechnica.com/journals/apple.ars/2007/04/21/mac-hacked-for-10000
http://computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=cybercrime_and_hacking&articleId=9017380&taxonomyId=82&intsrc=kc_top
Lo que al principio se creyó sólo un problema de Safari (el navegador desarrollado por Apple) y se recomendaba
http://www.matasano.com/log/806/hot-off-the-matasano-sms-queue-cansec-macbook-challenge-won/ "You were wondering if your MacBook was vulnerable even after you applied that last batch of Apple patches? Sean Comeau confirms, “Currently, every copy of OS X out there now is vulnerable to this”. You are. So, uh, switch to Firefox until the patch comes out? Or live dangerously like me."
Más adelante se detectó que el "bug" afectaba a todos los navegadores y sistemas operativos que utilizaran QuickTime y Java y como toda solución se recomendó desactivar Java
http://securitywatch.eweek.com/apple/quicktime_bug_affects_all_javaenabled_browsers.html?kc=EWWHNEMNL042607EOAD
http://www.macworld.com/news/2007/04/25/qthack/index.php
Finalmente Apple ha preparado un parche para QuickTime
http://news.com.com/Apple+plugs+QuickTime+zero-day+flaw/2100-1002_3-6180679.html?tag=nefd.top
Hoy se publica en MacWorld una entrevista al descubridor y "explotador" del "bug"
http://uk.theinquirer.net/?article=39327 y de ahí
http://www.macworld.com/news/2007/04/30/daizovi/index.php
Entre otras cosas afirma "I have found the code quality, at least in terms of security, to be much better overall in Vista than Mac OS X 10.4. It is obvious from observing affected components in security patches that Microsoft’s Security Development Lifecycle (SDL) has resulted in fewer vulnerabilities in newly-written code. I hope that more software vendors follow their lead in developing proactive software security development methodologies."
Lo que no está mal para un aficionado al Mac... para que luego sólo se critique a Microsoft en cuestiones de seguridad.
No hay comentarios:
Publicar un comentario