QuickTime bug brought down MacBook

Summary:The vulnerability is a Java-based vulnerability in QuickTime, which is installed by default on Mac OS X. Any Java-enabled Web browser on this platform is an attack vector.

Just got this information via e-mail from Dino Dai Zovi, the hacker who successfully hijacked a MacBook Pro to win a contest at CanSecWest: 

The vulnerability is a Java-based vulnerability in QuickTime, which is installed by default on Mac OS X.  Any Java-enabled Web browser on this platform is an attack vector and at this point, both Safari and FireFox have been confirmed to be vulnerable.  This vulnerability may not only affect Mac OS, FireFox on Windows is also considered at risk at this time.

To protect yourself, turn off all unnecessary browser features such as extra plug-ins, JavaScript and Java.

Hardened browser configuration
Screenshot via Matasano Security. Also see David Maynor's post about how easy it is to uncover these kinds of vulnerabilities. 

Topics: Open Source, Apple, Hardware, Security

About

Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company's online community initiative around secure content managem... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.