Hack contest's QuickTime bug puts all browsers at risk

Exploit snatched at security conference from unprotected WiFi network, may be in the wild

The QuickTime vulnerability that first surfaced last Friday in a Mac hack challenge is "very serious" and can be exploited through any Java-enabled browser, including Internet Explorer 7 running on both Windows XP and Vista, the company that laid out the contest's US$10,000 prize said Wednesday.

Unconfirmed reports also claimed that someone may have captured the exploit on Friday as the MacBook Pro was attacked. If that turns out to be the case, a widespread attack would be more likely.

Although the bug was first ascribed to Apple's Safari Web browser, by Monday researchers at 3com TippingPoint -- which put up the prize money as part of its Zero Day Initiative bug bounty program -- had confirmed the vulnerability was in QuickTime, Apple's media player.

Because the flaw is in QuickTime's code, and because QuickTime plug-ins are commonly installed on both Macs and PCs, and in not only Safari, but also Mozilla's Firefox and Microsoft's Internet Explorer (IE), the attack surface is "huge," said Terri Forslof, TippingPoint's manager of security research.

"This is every bit as dangerous as any vulnerability we see out there," said Forslof, who confirmed Wednesday that using IE 6 and IE 7 on Windows XP SP2, as well as IE 7 on Vista, could lead to an exploit. "If Microsoft was rating this, it would [rate it as] a critical vulnerability. One click and you're owned."

"The vulnerability is in QuickTime, but any Java-enabled browser can be an exploit vector. No exclusions," said Forslof. TippingPoint confirmed this morning that IE 7 running on Vista -- the browser that Microsoft touts as its most secure -- could be a route to a PC hijack.

A successful exploit would require that the user be tricked into visiting a Web site containing malicious Java code. That kind of attack is commonplace, with links typically delivered via spammed e-mail. Until Apple patches QuickTime, the only sure defense, said Forslof, is to disable Java in the browser.

Late Wednesday morning, researchers at Matasano Security, the New York-based consultancy where the MacBook contest winner, Dino Dai Zovi, once worked, said it had unconfirmed reports from credible sources that the exploit had been snatched out of the air at the CanSecWest conference.

The MacBooks left open to attack during the CanSecWest challenge were connected to an unprotected wireless network, said Matasano's Thomas Ptacek in a blog this morning. "Raw packet captures of the successful exploit have been taken by parties unknown," he said. "There's a difference between the exploit being captured and the exploit being successfully hosted by attackers in the wild....[but] even so, this is a particularly virulent problem."

Adding fodder to those reports, a writer on the Information Security Sell Out blog claimed to have not only captured all data packets transmitted during the hacking contest, but had reverse-engineered the vulnerability.

Ptacek of Matasano, however, was dubious. "Their claims aren't corroborated by any of the public record about the vulnerability, which, contrary to their report, doesn't appear to involve 'the way QuickTime handles Javascript'."

Forslof would neither confirm nor deny the reports of the exploit -- for which it paid Di Zovie the US$10,000 -- escaping into the wild. "We're keeping the details of the vulnerability close to the chest," she said, "but QuickTime is pretty ubiquitous. With so much press around the actual challenge and so many people interested in it, an exploit is just a matter of time."

Although Forslof said that her team had reported the QuickTime vulnerability to Apple on Monday, the computer maker has refused to comment on the specifics of the bug. Company spokesman Anuj Nayar would only repeat the standard Apple statement issued when security questions are asked: "Apple takes security very seriously and has an excellent track record of addressing potential vulnerabilities. We always welcome feedback on how to improve security."

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?