Friday, September 3, 2010

Apple Had Two Months to Fix Critical QuickTime Bug

Via Computerworld -

A critical bug in QuickTime was reported to Apple two months before a second researcher independently revealed the vulnerability this week, the director of a bug bounty program said today.

The duplicate discovery was just one of an increasing number of overlapping vulnerability reports that show vendors must patch faster, said Aaron Portnoy, security team lead for HP TippingPoint's Zero Day Initiative (ZDI), the largest vulnerability payment program in the country.

"Overlapping discoveries are occurring much more often," said Portnoy. "This just reinforces the reasoning to put disclosure deadlines on vulnerabilities."

The increase is proof, said Portnoy, that multiple researchers often find the same flaw independently, a tenant of those who believe that researchers are in the right when they take bugs public to put pressure on vendors to patch. By that line of thinking, if one researcher has found a flaw -- even if it's kept private until it's patched -- others have probably also uncovered the bug. And some of them may be ready to exploit the vulnerability in the wild long before a fix is available.

This week's QuickTime bug is a case in point, said Portnoy.

"One of our researchers submitted this, and we reported it to Apple on June 30," said Portnoy. So far, Apple has not responded to ZDI's bug report.

Portnoy blasted Apple for wasting the opportunity to patch the bug before it went public. "We gave this to Apple two months ago, and a fix requires no testing," said Portnoy. "I can't understand it. It's literally a single parameter [in QuickTime]. I could have completely solved this within a day."

On Monday, Spanish researcher Ruben Santamarta published information about the bug in the QuickTime plug-in for Microsoft's Internet Explorer (IE), and traced the flaw to Apple's failure to clean up code after developers dropped the "_Marshaled_pUnk" function.

[...]

Since then, attack code has been added to Metasploit, a popular open-source hacking toolkit, and reports have surfaced that malicious sites are already hosting the exploit and using it to compromise PCs.

Last month, ZDI announced it would give vendors six months to patch a submitted bug before releasing some information about the vulnerability, a major change from earlier policy, which mandated that it keep quiet until flaws had been fixed.

"That wouldn't have helped in this instance," Portnoy acknowledged. "But if [Apple] had patched it, they could have avoided all this bad press."

After Santamarta published his findings, ZDI posted an advisory that credited a researcher identified as "HBelite" with submitting the vulnerability.

"We don't have any way to force vendors to patch," said Portnoy. "It's a bit of a battle between us and the vendors. But [Santamarta's disclosure] is one way to get their attention."

Apple did not immediately reply to a request seeking comment on its patch plans for QuickTime, or to questions about why it had not fixed the flaw in the two months between ZDI's report and this week's disclosure by Santamarta.


-----------------------------------------------------------------------------------

Apple keeps saying they "take security serious", but actions speak louder than words. Words are cheap.

I guess Apple was too busy making some crappy social network in iTunes (e.g. Ping), which is now full of spam and scammers. Well done Apple.

No comments:

Post a Comment