This past week saw the announcement of several vulnerabilities in Mac OS X, some extremely serious. The first, a heap overflow in QuickTime reported by eEye, could allow an attacker to run arbitrary code in the context of the user running the QuickTime player.
The eEye advisory takes Apple Computer Inc. to task for understating the importance of the bug—for which Apple has supplied a patch—and for the obviousness of the vulnerability. Indeed, based on developer documentation cited by eEye, it sure quacks like a heap overflow.
This could be the big one. Based on this, you really could build a Sasser-type worm, one that travels from computer to computer without the user having to do anything stupid such as launch an attachment. The whole thing could happen at night while youre asleep.
The overflow is in the Apple Filing Protocol (AFP), which provides file-sharing services for both clients and servers similar to SMB/CIFS on Windows and Samba. Its true that AFP is not enabled by default, but its enabled on anything sharing files.
Certain requests to authenticate with the target system can overflow it simply by specifying a pathname longer than the specified length. This one, again, shouldnt have made it past any serious scrutiny. It works on multiple OS X versions, and it can give the attacker root privileges. Apple has patched this, too. See the Apple Security Updates page for more details and for the patches.
Interestingly, Apple released several other patches this week. None of them appears to be as serious as the two above, but its hard to be comfortable with that since Apple appears to understate the importance of the AFP problem.
For example, the companys advisory says that the point of the patch is "to improve the handling of long passwords." Because of this, security firm Secunia has chosen to assume that all of the vulnerabilities are more serious than Apple concedes.