iTnews

Apple Lion borrows from Vista but iCloud doubts linger

By Darren Pauli on Jun 7, 2011 11:18AM
Apple Lion borrows from Vista but iCloud doubts linger

Layout randomisation and other features should make malicious hackers' lives more difficult.

While Apple fans were counting the list of features in its announcements today of Lion, a new version of its operating system and its fourth-generation iCloud service, security professionals digging under the hood declared the new platforms more secure but with caveats.

For instance, for the first time Mac OS X users will be protected by Address Space Layout Randomisation, (ASLR) an anti-exploit system that obfuscates important system functions.

And they get Data Execution Prevention (DEP) for 64-bit and 32-bit processes; it was offered on only the 64-bit version of predecessor operating system, Snow Leopard.

Apple hacker Charlie Miller said the new platforms have improved security.

"Things like the Flash Plugin or Microsoft Office are only 32-bit and so it is easy for attackers to exploit these processes by just injecting shellcode and having it execute," said Dr Miller, who has won the Pwn2Own hacking competition of Mac systems four times.

"Lion says it will enforce DEP on all processes, 64-bit and 32-bit, both. This would be an improvement."

And if Apple implemented layout randomisation properly, it will make it more difficult-to-write exploits for the platform.

He said layout randomisation in Snow Leopard and the earlier Leopard operating systems were incomplete: "Lion says it has improved ASLR; we will see exactly what is improved".

The easiest way to exploit DEP is to reuse executable code in the process called return-oriented programming; layout randomisation scrambled the location of libraries but not the location of the binary, dynamic memory or dynamic linker.

Using DEP and ASLR together made such attacks impossible without another attack vector, Dr Miller said.

"I demonstrated how to build an exploit based only on knowing the position of the dynamic linker," he said.  "If this location is randomised, it will be much harder to write exploits."

Vista has had layout randomisation since its Vista operating system.

Lion will also introduce sandboxes and privilege separation. Little is known about how extensively this was used, and those developers who have tested the operating system are under non-disclosure agreements.

Dr Miller said Snow Leopard had limited sandboxing for critical processes but not important applications such as Safari or Mail.

"Not many details about Lion have been revealed, but it would be cool if Safari was sandboxed," he said.

Apple introduced encryption into its MobileMe platform last year, and in May hired former National Security Agency vulnerability expert and US Navy cryptologic specialist David Rice as its chief security officer. The fourth-generation iCloud service is the successor to MobileMe, its third foray into cloud services after .Mac and iTools.

I came, I saw, iCloud: The SC takeaway

Enterprises should still consider implications of data sovereignty and trust with any cloud service and Apple's iCloud was no exception.

And chief information officers should consider how it affected security or their organisation's data.

The consumerisation of technology has a habit of permeating business and iCloud was sure to make it through the corporate gates, especially as users adopt it without the blessing of the IT shop.

Perhaps the most immediate danger of iCloud is it's seamless drag and drop interface that, while hiding complexity from the user, may also see staff flippantly sending corporate secrets to servers offshore and outside the ITdepartment's control.

That factor could be exaggerated as Apple CEO, Steve Jobs' stated ambition for iCloud is it will replicate data across the user's devices.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
analysis apple aslr dep lion mac os x rop security

Partner Content

New Intel NUCs advancing mini-PC possibilities for business
Partner Content New Intel NUCs advancing mini-PC possibilities for business
Setting a path to self-funded mainframe-to-cloud modernisation with Micro Focus
Promoted Content Setting a path to self-funded mainframe-to-cloud modernisation with Micro Focus
Putting cyber security basics in place
Partner Content Putting cyber security basics in place
Resetting cyber security for the new threat landscape
Partner Content Resetting cyber security for the new threat landscape

Sponsored Whitepapers

Is the technology refresh dead?
Is the technology refresh dead?
DevSecOps: A framework for digital innovation
DevSecOps: A framework for digital innovation
Encryption: Protect your most critical data
Encryption: Protect your most critical data
Overcoming data security challenges in a hybrid, multicloud world
Overcoming data security challenges in a hybrid, multicloud world
Move beyond passwords
Move beyond passwords

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • [Webinar] - Transformation versus compliance – a guide for CXOs
  • Masters of Microsoft Licensing
By Darren Pauli
Jun 7 2011
11:18AM
0 Comments

Related Articles

  • Apple to start enforcing new app privacy notifications in coming weeks
  • Apple patches exploited iOS, iPadOS zero-day
  • Apple gets boost in French privacy fight, but still faces antitrust probe
  • French startup lobby to file privacy complaint against Apple
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Aussie Broadband to white label its services

Aussie Broadband to white label its services

Vodafone hit by nationwide 4G outage

Vodafone hit by nationwide 4G outage

ATO loses its cyber security chief

ATO loses its cyber security chief

Virgin Australia rebuilds its IT leadership team

Virgin Australia rebuilds its IT leadership team

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.