Berkeley CSUA MOTD:Entry 54224
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/23 [General] UID:1000 Activity:popular
5/23    

2011/11/11-30 [Computer/SW/Security] UID:54224 Activity:nil
11/11   MacOSX's Sandbox security hole:
        http://preview.tinyurl.com/7ph2wtg [arstechnica]
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/23 [General] UID:1000 Activity:popular
5/23    

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (2573 bytes)
preview.tinyurl.com/7ph2wtg -> arstechnica.com/apple/news/2011/11/researchers-discover-mac-os-x-has-its-own-sandbox-security-hole.ars
public notification of a potential security vulnerability in Mac OS X's sandboxing mechanisms. According to CoreLabs, it's possible for sandboxed apps to trigger external processes that aren't sandboxed and possibly gain privileges not granted by a particular sandboxing profile. sandbox design use a set of "entitlement" profiles defined by Apple; those profiles determine which system resources it can use and which are off limits. CoreLabs discovered that some of the limits in the default profiles can actually be circumvented by triggering certain Apple Events. In particular, Apple Events can cause launchd to launch a separate process without sandbox restrictions. CoreLabs explained that a default profile that restricts an app from network access, for instance, could open a socket via osascript, thereby working around the network access restriction. Beyond the obvious potential for a malicious app to break out of the sandbox, these default profiles also set a potentially bad example for developers who think they are locking down their apps properly. "If the no-network profile allows AppleScript events, this may result in new applications using the same restriction rules, therefore offering a false sense of security," CoreLabs explained in its vulnerability report. criticized Apple's response to the vulnerability as well--the response being nothing, mostly. After being notified of the vulnerability, Apple apparently decided to merely modify its documentation to point out "that the restrictions that these particular sandbox profiles provide are limited to the process in which the sandbox is applied." He noted that similar sandboxing profile vulnerabilities were discovered by security researcher Charlie Miller in 2008. "At that time Apple modified the profile to prevent the vulnerability reported from being triggered, so the question remains: why has Apple chosen not to do that in this instance?" If Apple's response to sandbox flaws is to ignore them--as it appears to have done in this case--then users will end up with apps limited by the sandboxing restrictions without the improved security they were promised. still debating whether Apple's sandboxing requirements will actually improve security or not. Security researcher Jonathan Zdziarski told Ars that he believes the potential downsides aren't worth the supposed security improvements. entitlements are a binary solution--if there's a hole anywhere in it that malware authors find, then there's really not much Apple can do until they issue a full operating system patch," he wrote.