Attack code out for new Apple Wi-Fi flaw
Kicking off a “month of kernel bugs,” a security researcher has released attack code that he claims exploits a new security hole in wireless software from Apple Computer.
The vulnerability lies in the Apple AirPort driver, according to details on the flaw published by H.D. Moore, the developer of the Metasploit security tool. It affects only the AirPort driver provided with wireless cards shipped between 1999 and 2003 with PowerBooks and iMacs, the posting said.
To launch an attempt, the hacker would have to be on the same wireless network as a vulnerable Mac. The attack entails trying to trigger a memory corruption flaw by sending a malformed data packet to the computer, according to Moore’s advisory. But the process isn’t easy, and Moore hasn’t yet been able to gain complete control over a vulnerable Mac, he wrote in an e-mail to CNET News.com.
“The vulnerability itself only affects older hardware and is going to be difficult to turn into a remote code execution exploit, but it’s definitely possible, just a matter of time and motivation,” Moore said. “The current proof-of-concept triggers a fatal kernel panic and forces the user to power cycle their machine.”
Apple is investigating the flaw, Lynn Fox, a spokeswoman for the Mac maker, said in a statement sent via e-mail. “This issue affects a small percentage of previous generation AirPort-enabled Macs and does not affect currently shipping or AirPort Extreme enabled Macs,” she said.
The public release of the Mac vulnerability is the kick-off for an initiative titled the “Month of Kernel Bugs,” launched by a security researcher who goes by the initials “LMH.” As part of the effort, details of a new bug in low-level software will be made public every day. It is a follow-up to Moore’s July month of browser bugs, and a jab at Apple’s security and the company’s response to earlier discussions of Wi-Fi flaws.
more from [url=http://news.zdnet.com/2100-1009_22-6131711.html]Znet[/url]
Post a reply
You must be logged in to post a comment.