Dailydave mailing list archives
Re: This guy cracks me up. (MindsX)
From: John Gruber <gruber () daringfireball net>
Date: Mon, 4 Sep 2006 18:41:18 -0400
johnycsh wrote on 9/3/06 at 12:37 PM:
1) Secureworks absolutely insists on being exceedingly
responsible and doesn't want to release any details about
anything until Apple issues a patch. Whether or not this
position was taken after a special ops team of lawyers
parachuted in out of a black helicopter is up for
speculation.
This implies that Apple will be issuing "a patch" (or at least that you think they should be). What for? For something you and David Maynor discovered and reported to them? Is it something that affects stock MacBooks? If so, do you have an exploit against the built-in AirPort card and driver that even vaguely resembles the video demonstration you showed at the Black Hat conference? Are you therefore saying that Lynn Fox's statement that you'd shown them "no evidence" was an outright lie?
2) Responding to mac bloggers isn't my idea of a good time.
Nothing I could say would ever convince them.
You could easily convince me by showing me, or someone I trust, a stock MacBook getting hijacked or otherwise attacked.
This isn't even a personal attack against them; it's that they lack the technical skills required to understand this problem. In short, anyone qualified to sit and discuss the look and feel of changes of Mail.app probably has no idea what ring0 code execution means.
Letting aside for now the idea that I couldn't possibly understand the details of "this problem", I fail to see why that would prevent you from answering a few basic questions about your findings. The details certainly matter, but what matters more are the basic implications. I'm interested primarily from the perspective of a black box -- if you know how to successfully attack a stock MacBook simply because its AirPort driver is on, that fact alone is interesting, regardless of *how* it works. My frustration is that neither you nor Maynor have answered the simple yes/no question of whether you've found an exploit against the stock MacBook AirPort card and driver.
1) set up a netcat udp listener on the victim centrino box. (Why you actually need a listener is beyond me, but it seems to help)
I don't understand what this means. Does it mean that the victim computer *must* be running a netcat udp listener for the attack to work? If so, how would this be exploited in the wild?
3) start flooding the victim machine with disassociation requests. A BSOD should follow very shortly.
So this attack crashes the machine?
The reason this bug takes two cards to exploit is that the race condition you are trying to win seems to be so small that a single card can't win it.
Who needs two cards -- the victim or the attacker?
You know, of all the comments I see, the ones that 'we played the media' make the least sense. Have you ever seen me in the news before? No. Have I ever talked to a reporter before? No. Am I doing a very good job of winning this PR smear campaign lynn fox ignited?
How exactly did she smear you? Why is that you feel free to say that you've been smeared, but won't state how you've been smeared? Even if you've been threatened, legally, by Apple, and thus feel you can't or shouldn't reveal any technical details regarding what you have found, why not at least state specifically the nature of the legal threat(s) against you? -J.G. _______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave
Current thread:
- Re: This guy cracks me up. (MindsX) johnny cache (Sep 03)
- Re: This guy cracks me up. (MindsX) Lyndon Sutherland (Sep 04)
- Re: This guy cracks me up. (MindsX) Blue Boar (Sep 04)
- <Possible follow-ups>
- Re: This guy cracks me up. (MindsX) John Gruber (Sep 04)
- Re: This guy cracks me up. (MindsX) Alexander Sotirov (Sep 05)
- Re: This guy cracks me up. (MindsX) H D Moore (Sep 05)
