lolzkoolbluez said:Waitin for youknowwho to show his presence here
Apple's browser, and by the way version 3 is going by default into Leopard, launches the following programs on execution: "Address Book, Finder, iChat, Script Editor, iTunes, Dictionary, Help Viewer, iCal, Keynote, Mail, iPhoto, QuickTime Player, Sherlock, Terminal, BOMArchiveHelper, Preview and DiskImageMounter." Any security vulnerability residing in any of these applications can be exploited via Safari.
the reasons for exploits. i'm not surprised! the easier you make an OS the more vulnerable it is to exploit! i guess its time for open group to bring out unix 07 certification wid stronger emphasis on security before anything gets to use that certification.1) According to Miller Macs are just as easy to hack as they are to use. "To help users, there are lots of 50+ suid root programs" revealed the security researcher. Suid Root is designed to help with the silent elevation of privileges in Unix and Unix based operating system such as the Mac OS X.....Suid Root is a design flaw, because allowing for silent and automatic elevation of privileges means inviting kernel level exploits.
2) Moreover, Apple does not "bother users with burdensome updates." All the open source solutions included in Mac OS X are not kept up to date including OpenSSH, OpenSSL, Apache, Samba, Cups. "The Samba on Mac OS X had an exploitable remote root vulnerability in it...it hadn’t been updated since February 2005"
3) But of course there's always the "safe from day one" Safari. Apple's browser, and by the way version 3 is going by default into Leopard, launches the following programs on execution: "Address Book, Finder, iChat, Script Editor, iTunes, Dictionary, Help Viewer, iCal, Keynote, Mail, iPhoto, QuickTime Player, Sherlock, Terminal, BOMArchiveHelper, Preview and DiskImageMounter." Any security vulnerability residing in any of these applications can be exploited via Safari.
4) "Apple doesn't randomize anything: the location of the stack, the location of the heap, the location of the binary image, the location of dynamic libraries and (to top it all off) heap is executable."
Yeeouch...in today's day and age (when Microsoft has implemented ASLR, Linux/Unix has PaX, etc...) that's just asking to become the next "easy target".Apple doesn't randomize anything: the location of the stack, the location of the heap, the location of the binary image, the location of dynamic libraries and (to top it all off) heap is executable.
That...ehh, that's bad...doubt I'll be trusting any software from them anytime soon!18 security vulnerabilities for Safari 3 in the browser's first day
deliberate act 2 bring someone into debate.... not suppose to do it.iMav said:and the salesman wont reply here
iMav said:u thought i was refering arya .... i wasnt ... so it is u who is trying to make arya feel that im refering to him thereby making him post here .... not supposed to do that