Tired of waiting on Apple, researchers disclose iCal bugs
Core Security warns users after Apple requests multiple delays
Computerworld - Critical vulnerabilities remain in Apple Inc.'s iCal calendar program, a security company said Wednesday in an advisory that showed months of back-and-forth between Apple and the researchers over whether bugs were serious enough to warrant patches, and if so, when Apple would patch them.
After several delays requested by Apple, the security vendor put its foot down and told the company's security team it would release information about the vulnerabilities May 21, whether Apple had issued patches or not.
In a bulletin posted to the Bugtraq and Full Disclosure mailing lists and on its own Web site, Core Security Technologies detailed three bugs in iCal that attackers could remotely exploit using compromised servers, malicious Web sites or e-mailed .ics file attachments.
"The vulnerabilities may allow un-authenticated attackers to execute arbitrary code on vulnerable systems with (and potentially without) the assistance from the end user of the application or to repeatedly execute a denial of service attack to crash the iCal application," said Core Security.
iCal is the scheduling and to-do application bundled with Mac OS X. It's used both as a standalone personal calendaring program and also as the client for connecting to Apple's calendar server.
Core Security first reported the iCal vulnerabilities and a fourth in iCal Server, a component of Mac OS X Server, on Jan. 30, 2008, but then spent nearly the next four months asking Apple when the company would patch the bugs, answering questions from Apple's security team and pushing back the deadline for publishing its findings.
In March, Apple said it considered only one of the three vulnerabilities a "security bug," according to Core Security, a stance that researchers there contested several times. "Vendor states that end of April is still the estimated date and provides more details that explain why the first two bugs are been considered null-pointer dereference bugs only," Core's timeline noted for April 17.
Later that day, Core said, it told Apple "the three bugs still have security-related consequences. Core considers bug[s] that allow unauthenticated third parties to be security vulnerabilities."
Apple patched the server-side vulnerability in March with Security Update 2008-002, a monster patch batch that included nearly 90 bug fixes; earlier, it had determined that the flaw was not in iCal Server, as Core Security had claimed, but in the Wiki Server instead.
But it was the patch planning for the iCal client that stretched on and on, said Core Security in the advisory. On four separate occasions, Apple requested that Core postpone the publishing of information about the vulnerabilities; each time Core agreed.
The problem: Apple kept shifting the deadline for delivering iCal patches.
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Considerations For Effective Software License Management For many reasons, software license management has become a critical issue for many IT organizations and enterprise's alike. With many licensing options, hurdles...
- eBay uses 100% OpenSource WSO2 ESB to process more than 1Billion transactions a day Along with eBay's success comes a huge demand to ensure reliable, 24x7 availability of the services that enable these transactions. For eBay, that...
- A Reference Architecture for the Internet of Things The aim of this is to provide Architects and Developers of IoT projects with an effective starting point that covers the major requirements...
- Live Webcast How to serve up a Grand Slam with a scalable IT Infrastructure for cloud, big data and advanced analytics Register today to attend this webcast, and see examples of how The U.S. Tennis Association, Wimbledon and U.S. Golf Association are using the...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel...
- Why do you need an enterprise mobile platform? Today companies must offer great apps that run on a range of devices, and connect to an exploding set of backend data. Appcelerator... All Malware and Vulnerabilities White Papers | Webcasts