Categories
Software

Intego Warns of Unrepaired Security Vulnerability in Mac OS X

applelogo1.jpg
Security firm Intego has warned that a critical security vulnerability within the current version of Java has gone unrepaired for months and may place Mac OS X users at risk.
According to the company’s web site, the current version of Java incorporates a serious flaw that could allow local code on a user’s Mac to be executed remotely.
“This can lead to ‘drive-by attacks,’ where users are attacked simply by visiting a malicious web site and loading a web page,” the firm said.
The exploit could allow a third-party to execute code, access or delete files, or run applications on the compromised machine. Combined with other exploits, outside parties could even potentially run system-level processes and gain total access over the affected Mac.
Given that the vulnerability relies solely on Java, no native code is required to execute the flaw, which theoretically exists in all browsers on all platforms that have not been patched. This is the case with Mac OS X 10.5.7 and earlier, meaning the vulnerability affects even the update released just a week ago.
The firm claims that Apple has been aware of the exploit for at least five months, when it was publicly disclosed and fixed by Sun, but has yet to issue a security patch. The exploit was first discovered by Landon Fuller, who has released a proof of concept via his blog that outlines the security hole.
Intego has stated that it has not found any malicious applets in the wild thus far, but the publicity around this vulnerability may entice hackers to target the exploit before Apple issues a security update. The firm’s VirusBarrier X5 already blocks potential malware but unless users are sure they trust the site they’re viewing, simply disabling Java in the browser may provide the best protection while Apple works on a fix.
To disable Java, launch Safari, choose Safari > Preferences, click the Security tab, and uncheck “Enable Java” if it is checked. In Firefox, this setting is found on the Content tab of the program’s preferences. It is safe to leave JavaScript activated, since the vulnerability only affects Java applets.