Subscribe via feed.
Posts under OSX security tools

Cross-Domain Information Leakage / Temporary User Tracking In Safari

Posted by deepcore under Apple, OSX security tools (No Respond)

Apple Safari versions 4.02 through 4.05 and Windows versions 5.0 through 5.0.2 suffer from cross-domain information leakage and temporary user tracking vulnerabilities.

Tags: , ,

Secunia Security Advisory 42312

Posted by deepcore under Apple, exploit, OSX security tools, Security (No Respond)

Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people bypass certain security restrictions, conduct spoofing attacks, disclose sensitive information, cause a DoS (Denial of Service), or to compromise a user’s system.

Tags: , , ,

Apple Safari Selections Handling Use-after-free Vulnerability

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

VUPEN Vulnerability Research Team discovered a critical vulnerability in Apple Safari. The vulnerability is caused by a use-after-free in WebKit when handling selections, which could be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

Tags: , , ,

Secunia Security Advisory 42264

Posted by deepcore under Apple, exploit, OSX security tools, Security (No Respond)

Secunia Security Advisory – Multiple vulnerabilities and weaknesses have been reported in Apple Safari, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a user’s system.

Tags: , ,

Zero Day Initiative Advisory 10-255

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 10-255 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the quicktime.qtx. When handling the m1s atom an integer value is used as an offset into a buffer. Minimal validation is done and an attacker can supply a negative value. This can be used to write to an arbitrary address in process memory. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the user.

Tags: , , ,

Zero Day Initiative Advisory 10-254

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 10-254 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the QuickTimeMPEG.qtx module. When handling an ELST atom’s edit list table data large values are not handled properly. Specifically, the media rate field is explicitly trusted and can be abused to control memory copy operations. By specifying a large enough value, an attacker can utilize this to write to an arbitrary address in process memory. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the user.

Tags: , , ,

Zero Day Initiative Advisory 10-253

Posted by deepcore under Apple, OSX security tools (No Respond)

Zero Day Initiative Advisory 10-253 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required in that a target must open a malicious media file or visit a malicious page. The specific flaw exists within the application’s implementation of the LZW compression when opening a certain file format. The application will allocate a buffer for the image and then decompress image data into it. Due to explicitly trusting the decompressed data, a buffer overflow will occur. This can lead to memory corruption and code execution under the context of the application.

Tags: , , ,

Nmap 5 released (with native GUI)

Posted by deepquest under OSX security tools, software (No Respond)

Another milestone in the development ofย  Nmap the most famous port scanner Fyodor. The change log is massive and impressive, with more than 600 major improvements. It also includes a native graphic interface and other already known modules such as netcat and more.

Tags:

Second OS X virus exploits Bluetooth flaw

Posted by deepquest under OSX security tools (No Respond)

Second OS X virus exploits Bluetooth flaw

Data recovery on OSX that works!

Posted by deepquest under Apple, OSX security tools (No Respond)

Data recovery on OSX that works!