Apple Plugs 16 Holes in Safari As Pwn2Own Looms
Apple has patched 16 bugs in the Safari browser, 12 of them critical, just two weeks before it faces off against rival technologies at the 2010 Pwn2Own hacking challenge.
Fri, March 12, 2010
Computerworld — Two weeks before a browser hacking contest is to kick off in Vancouver, British Columbia, Apple (AAPL) yesterday patched 16 vulnerabilities in Safari, 12 of them critical bugs that could be used to hijack a machine.
Apple updated Safari for both Mac OS X and Windows to version 4.0.5, hardening the browser before it's tossed into the ring with Microsoft's (MSFT) Internet Explorer (IE), Mozilla's Firefox and Google's (GOOG) Chrome at this year's Pwn2Own hacking challenge. The contest organizer has predicted that Safari would be the first to fall when researchers battle for $40,000 in prize money beginning March 24 at the CanSecWest security conference.
Slideshow: 12 Years of Big-Time Apple Innovations
The last time that Apple refreshed Safari was in November 2009, when version 4.0.4 quashed seven bugs.
According to Apple's advisory , three-fourths of the vulnerabilities -- 12 of the 16 -- were labeled with Apple's "arbitrary code execution" phrase, meaning the flaws are critical and could be exploited to compromise a Mac or a Windows machine. Unlike other vendors, such as Microsoft and Oracle (ORCL), Apple does not assign a threat ranking to the bugs it discloses.
Nine of the 16 flaws patched Thursday were in the open-source WebKit browser engine that forms the foundation of Safari; six affected only the Windows version, which runs on XP, Vista and Windows 7. Of the half-dozen Windows-only vulnerabilities, four were in the Image IO component, and could be triggered by specially-crafted TIFF or BMG image files when rendered by Safari.
Two of the 16 were reported to Apple by browser rivals. Billy Rios, a browser bug researcher who formerly worked for VeriSign (VRSN) but now is on the Microsoft Vulnerability Research (MSVR) team, was credited with one of the Windows-only flaws; Robert Swiecki of Google found one of the WebKit vulnerabilities.
The WebKit fixes may be timely. Last month, Aaron Portnoy, security research team lead with 3Com (COMS) TippingPoint, the sponsor of Pwn2Own, bet that Safari would crumble at the contest in part because it's built "on the notoriously buggy WebKit."
In both 2008 and 2009, researcher Charlie Miller hacked into a Mac within minutes at Pwn2Own by exploiting an unpatched Safari vulnerability.
Safari 4.0.5 also included stability improvements for unspecified third-party browser plug-ins, performance improvements for the Top Sites feature that shows users domains they visit most often, and fixes for non-security bugs in how the browser handles router settings and works with the iWork suite's Web-based document sharing site.