December 19, 2007

Mac versus Windows vulnerability stats for 2007

December 18th, 2007

Posted by George Ou

The year 2007 has been an interesting year that brought us improved security with Windows Vista and Mac OS X Leopard (10.5).   But to get some perspective of how many publicly known holes found in these two operating systems, I’ve compiled all the security flaws in Mac OS X and Windows XP and Vista and placed them side by side.  This is significant because it shows a trend that can give us a good estimate for how many flaws we can expect to find in the coming months.  The more monthly flaws there are in the historical trend, the more likely it is that someone will find a hole to exploit in the future.  For example back in April of this year, hackers took over a fully patched Macbook and won $10,000 plus the Macbook they hacked.

I used vulnerability statistics from an impartial third party vendor Secunia and I broke them down by Windows XP flaws, Vista flaws, and Mac OS X flaws.  Since Secunia doesn’t offer individual numbers for Mac OS X 10.5 and 10.4, I merged the XP and Vista vulnerabilities so that we can compare Vista + XP flaws to Mac OS X.  In case you’re wondering how 19 plus 12 could equal 23, this is because there are many overlapping flaws that is shared between XP and Vista so those don’t get counted twice just as I don’t count something that affects Mac OS X 10.4 and 10.5 twice.

Windows XP, Vista, and Mac OS X vulnerability stats for 2007
  XP Vista XP + Vista Mac OS X
Total extremely critical 3 1 4 0
Total highly critical 19 12 23 234
Total moderately critical 2 1 3 2
Total less critical 3 1 4 7
Total flaws 34 20 44 243
Average flaws per month 2.83 1.67 3.67 20.25

 X Extremely critical
 H Highly critical
 M Moderately critical
 L Less critical

So this shows that Apple had more than 5 times the number of flaws per month than Windows XP and Vista in 2007, and most of these flaws are serious.  Clearly this goes against conventional wisdom because the numbers show just the opposite and it isn’t even close.

Also noteworthy is that while Windows Vista shows fewer flaws than Windows XP and has more mitigating factors against exploitation, the addition of Windows Defender and Sidebar added 4 highly critical flaws to Vista that weren’t present in Windows XP.  Sidebar accounted for three of those additional vulnerabilities and it’s something I am glad I don’t use.  The lone Defender critical vulnerability that was supposed to defend Windows Vista was ironically the first critical vulnerability for Windows Vista.

Windows XP, Vista, and Mac OS X vulnerability details for 2007
Month Windows XP Windows Vista Mac OS X
DEC CVE-2007-0064 H
CVE-2007-3039 L
CVE-2007-3895 H
CVE-2007-3901 H
CVE-2007-5355 L
CVE-2007-0064 H
CVE-2007-5350 L
CVE-2007-3895 H
CVE-2007-3901 H
CVE-2007-5351 M
CVE-2007-5355 L
 
CVE-2006-0024 H
CVE-2007-1218 H
CVE-2007-1659 H
CVE-2007-1660 H
CVE-2007-1661 H
CVE-2007-1662 H
CVE-2007-3798 H
CVE-2007-3876 H
CVE-2007-4131 H
CVE-2007-4351 H
CVE-2007-4572 H
CVE-2007-4708 H
CVE-2007-4709 H
CVE-2007-4710 H
CVE-2007-4766 H
CVE-2007-4767 H
CVE-2007-4768 H
CVE-2007-4965 H
CVE-2007-5379 H
CVE-2007-5380 H
CVE-2007-5398 H
CVE-2007-5476 H
CVE-2007-5770 H
CVE-2007-5847 H
CVE-2007-5848 H
CVE-2007-5849 H
CVE-2007-5858 H
CVE-2007-5850 H
CVE-2007-5851 H
CVE-2007-5853 H
CVE-2007-5854 H
CVE-2007-5855 H
CVE-2007-5856 H
CVE-2007-5857 H
CVE-2007-5859 H
CVE-2007-5860 H
CVE-2007-5861 H
CVE-2007-5863 H
CVE-2007-6077 H
CVE-2007-6165 H
CVE-2006-4339 H
CVE-2006-6731 H
CVE-2006-6736 H
CVE-2006-6745 H
CVE-2007-0243 H
CVE-2007-2435 H
CVE-2007-2788 H
CVE-2007-2789 H
CVE-2007-3004 H
CVE-2007-3005 H
CVE-2007-3503 H
CVE-2007-3504 H
CVE-2007-3655 H
CVE-2007-3698 H
CVE-2007-3922 H
CVE-2007-4381 H
CVE-2007-5232 H
CVE-2007-5862 H
CVE-2007-6276 M
NOV     CVE-2007-6165 H
CVE-2007-4702 L
CVE-2007-4703 L
CVE-2007-4704 L
CVE-2005-0953 H
CVE-2005-1260 H
CVE-2007-0464 H
CVE-2007-0646 H
CVE-2007-2926 H
CVE-2007-3456 H
CVE-2007-3749 H
CVE-2007-3756 H
CVE-2007-3758 H
CVE-2007-3760 H
CVE-2007-3999 H
CVE-2007-4267 H
CVE-2007-4268 H
CVE-2007-4269 H
CVE-2007-4671 H
CVE-2007-4678 H
CVE-2007-4679 H
CVE-2007-4680 H
CVE-2007-4681 H
CVE-2007-4682 H
CVE-2007-4683 H
CVE-2007-4684 H
CVE-2007-4685 H
CVE-2007-4686 H
CVE-2007-4687 H
CVE-2007-4688 H
CVE-2007-4689 H
CVE-2007-4690 H
CVE-2007-4691 H
CVE-2007-4692 H
CVE-2007-4693 H
CVE-2007-4694 H
CVE-2007-4695 H
CVE-2007-4696 H
CVE-2007-4697 H
CVE-2007-4698 H
CVE-2007-4699 H
CVE-2007-4700 H
CVE-2007-4701 H
CVE-2007-4743 H
OCT CVE-2007-5587 L
CVE-2007-2217 H
CVE-2007-2228 L
CVE-2007-3897 H
CVE-2007-2228 L
CVE-2007-3897 H
 
SEPT CVE-2007-4916 M CVE-2007-3036 L  
AUG CVE-2007-1749 H
CVE-2007-3034 H
CVE-2007-2224 H
CVE-2007-3033 H
CVE-2007-3032 H
CVE-2007-3891 H
CVE-2007-1749 H
CVE-2004-0996 H
CVE-2004-2541 H
CVE-2005-0758 H
CVE-2005-3128 H
CVE-2006-2842 H
CVE-2006-3174 H
CVE-2006-4019 H
CVE-2006-6142 H
CVE-2007-0450 H
CVE-2007-0478 H
CVE-2007-1001 H
CVE-2007-1262 H
CVE-2007-1358 H
CVE-2007-1460 H
CVE-2007-1461 H
CVE-2007-1484 H
CVE-2007-1521 cialis soft H
CVE-2007-1583 H
CVE-2007-1711 H
CVE-2007-1717 H
CVE-2007-1860 H
CVE-2007-2403 H
CVE-2007-2404 H
CVE-2007-2405 H
CVE-2007-2406 H
CVE-2007-2407 H
CVE-2007-2408 H
CVE-2007-2409 H
CVE-2007-2410 H
CVE-2007-2442 H
CVE-2007-2443 H
CVE-2007-2446 H
CVE-2007-2447 H
CVE-2007-2589 H
CVE-2007-2798 H
CVE-2007-3742 H
CVE-2007-3744 H
CVE-2007-3745 H
CVE-2007-3746 H
CVE-2007-3747 H
CVE-2007-3748 H
CVE-2007-3944 H
 
JUL CVE-2007-3896 H
CVE-2007-4041 H
CVE-2007-5020 H
   
JUN CVE-2007-2219 H
CVE-2007-2218 H
CVE-2007-1658 H
CVE-2007-2225 H
CVE-2007-2227 H
CVE-2007-1658 H
CVE-2007-2225 H
CVE-2007-2227 H
CVE-2007-2229 L
CVE-2007-2399 H
CVE-2007-2401 H
CVE-2007-2242 M
MAY     CVE-2005-3011 H
CVE-2006-4095 H
CVE-2006-4096 H
CVE-2006-4573 H
CVE-2006-5467 H
CVE-2006-6303 H
CVE-2007-0493 H
CVE-2007-0494 H
CVE-2007-0740 H
CVE-2007-0750 H
CVE-2007-0751 H
CVE-2007-0752 H
CVE-2007-0753 H
CVE-2007-1536 H
CVE-2007-1558 H
CVE-2007-2386 H
CVE-2007-2390 H
APR CVE-2007-1205 H
CVE-2007-1206 L
CVE-2007-1973 L
CVE-2007-1209 L CVE-2006-0300 H
CVE-2006-5867 H
CVE-2006-6143 H
CVE-2006-6652 H
CVE-2007-0022 H
CVE-2007-0465 H
CVE-2007-0646 H
CVE-2007-0724 H
CVE-2007-0725 H
CVE-2007-0729 H
CVE-2007-0732 H
CVE-2007-0735 H
CVE-2007-0736 H
CVE-2007-0737 H
CVE-2007-0738 H
CVE-2007-0739 H
CVE-2007-0741 H
CVE-2007-0742 H
CVE-2007-0743 H
CVE-2007-0744 H
CVE-2007-0745 H
CVE-2007-0746 H
CVE-2007-0747 H
CVE-2007-0957 H
CVE-2007-1216 H
MAR CVE-2007-0038 X CVE-2007-0038 X CVE-2005-2959 H
CVE-2006-0225 H
CVE-2006-0300 H
CVE-2006-1516 H
CVE-2006-1517 H
CVE-2006-2753 H
CVE-2006-3081 H
CVE-2006-3469 H
CVE-2006-4031 H
CVE-2006-4226 H
CVE-2006-4829 H
CVE-2006-4924 H
CVE-2006-5051 H
CVE-2006-5052 H
CVE-2006-5330 H
CVE-2006-5679 H
CVE-2006-5836 H
CVE-2006-6061 H
CVE-2006-6062 H
CVE-2006-6097 H
CVE-2006-6129 H
CVE-2006-6130 H
CVE-2006-6173 H
CVE-2007-0229 H
CVE-2007-0236 H
CVE-2007-0267 H
CVE-2007-0299 H
CVE-2007-0318 H
CVE-2007-0463 H
CVE-2007-0467 H
CVE-2007-0588 H
CVE-2007-0719 H
CVE-2007-0720 H
CVE-2007-0721 H
CVE-2007-0722 H
CVE-2007-0723 H
CVE-2007-0724 H
CVE-2007-0728 H
CVE-2007-0726 H
CVE-2007-0730 H
CVE-2007-0731 H
CVE-2007-0733 H
CVE-2007-1071 H
FEB CVE-2006-1311 L
CVE-2007-0025 L
CVE-2007-0026 M
CVE-2007-0210 L
CVE-2007-0211 L
CVE-2006-5559 H
CVE-2007-0214 H
CVE-2006-5270 H CVE-2007-0021 H
CVE-2007-0023 H
CVE-2007-0197 H
CVE-2007-0614 H
CVE-2007-0710 H
JAN CVE-2007-0024 X   CVE-2007-0462 L
CVE-2007-0023 L
CVE-2007-0355 L
CVE-2007-0236 L
CVE-2007-0229 H

Permalink • Print • Comment

Dell adds Ubuntu 7.10 to its lineup

December 19th, 2007

Posted by Larry Dignan

Dell is adding Ubuntu 7.10, also known as Gutsy Gibbon, to its consumer Linux lineup in the U.S. The company has also expanded its Linux offerings abroad.

First, the Ubuntu 7.10 announcement. Dell on its blog Tuesday said that Ubuntu 7.0 will be preinstalled on the Inspiron 530 and Inspiron 1420. Ubuntu 7.10 will also be available on the Inspiron 530 in England, France and Germany.

Also see Adrian Kingsley-Hughes Ubuntu 7.10 series with the review, installation process and galleries (right).

Another feature Dell is adding is the ability to automatic DVD movie playback.

Dell writes:

The experience we wanted is simple — when you put a movie in, it plays. It is easy enough for a child and an example of the steps we are taking to make Ubuntu as enjoyable as possible.

It’s a bit comical that auto-DVD playback is a big deal, but that’s where we stand with desktop Linux. Applications that we’re all used to just aren’t quite there yet. However, that is changing rapidly. As it does the fear about jumping to desktop Linux will erode.

This takeaway was clear at IBM’s shindig yesterday. IBM is seeing employees convert to desktop Linux (Red Hat’s version), but the big hurdle is the set of applications. When applications that run on Windows run the same way on desktop Linux conversion will be easy. In IBM’s case Lotus Notes 8 had to offer the same experience on Windows and Linux to pave the way to switch.

Ubuntu is in a similar situation–once media features are easy ala built-in DVD playback–it may find some momentum. And with a refresh every six months the gap can close quickly. Gutsy Gibbon on Dell already has 3-D visual effects, a better desktop search engine, pre-installed Flash and recovery options.

But we aren’t there yet. This comment from Dell is telling:

Dell is working on bringing Ubuntu to more markets over time. In the meantime, tell your friends in the existing markets to buy a system now. The more we sell, the sooner we can expand the program.

Translation: Dell hasn’t sold enough to make it an option everywhere. It’s a chicken and egg argument. If those demand stars line up desktop Linux will be ready for prime time. Personally, I see a virtuous cycle beginning with desktop Linux, but the timing is open to debate.

cialis soft tabs vs cialis

Permalink • Print • Comment

Remove tell-tale metadata from Microsoft apps

December 17th, 2007

Posted by Robin Harris

When you send a Word document to a client or a co-worker, you are also sending metadata – info about the document – as well. You can easily include embarrassing comments, hidden text or info helpful to hackers. Here’s how to get rid of it.

Start with this Microsoft support document
Titled How to minimize metadata in Office documents, the document covers the following Office apps:

Permalink • Print • 1 Comment

Apple delivers hefty patch haul; Addresses Leopard flaws and Safari

December 17th, 2007

Posted by Larry Dignan

Apple on Monday delivered another 41 patches to address multiple vulnerabilities in Mac OS X and Mac OS X Server including more than a few for Leopard.

The security update, which matches last month’s patch crop from Apple, features a few common threads. Among them:

  • Leopard and Tiger are affected;
  • The patches mostly cover flaws that allow hackers to take over your system;
  • Execution holes abound throughout Mac OS X in iChat,  Core Foundation, cialis soft tablets Quick Look and Desktop Services;
  • Apple has been busy on the security front. Last week, Apple delivered a Java runtime update and patched a bunch of QuickTime. QuickTime has been under fire of late.

In any case, it is recommended that you update. Here’s the laundry list of Apple’s latest round of patches.

CVE-2007-4708: This plugs vulnerability in Address Book’s URL handler. Apple says: “By enticing a user to visit a maliciously crafted website, a remote attacker may cause an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of format strings.” Versions affected include Mac OS X v10.4.11 and Mac OS X Server v10.4.11. Anyone running Mac OS X 10.5 or later isn’t affected.

CVE-2007-4709: This one covers the Mac OS X v10.5.1, Mac OS X Server v10.5.1–also known as Leopard. The problem: “A path traversal issue exists in CFNetwork’s handling of downloaded files,” said Apple. In a nutshell, visiting a malicious Web site could allow the automatic download of files to arbitrary folders, which is a nice way of saying your computer has been hijacked.

CVE-2007-4710: This covers Mac OS X v10.4.11, Mac OS X Server v10.4.11 and doesn’t affect Leopard. Specifically, Apple is addressing ColorSync. The issue: “Viewing a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution.” Leopard not affected.

CVE-2007-5847: Again, this ditty covers Mac OS X v10.4.11, Mac OS X Server v10.4.11. (See a trend here yet?). The problem is Core Foundation, which could disclose sensitive information. Leopard not affected.

CVE-2007-5848: This one covers a CUPs vulnerability in a printer driver. Apple says “a local admin user may be able to gain system privileges.” Leopard not affected.

CVE-2007-4351: Another CUPS problem and this one affects Leopard. Specifically, the OS X flavors impacted include Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.1, Mac OS X Server v10.5.1. The update corrects for a memory corruption issue in the handling of Internet Printing Protocol tags that could lead to an application crash or arbitrary code execution.

CVE-2007-5849: Another CUPs issue affecting Leopard and Leopard Server. Apple says: “If SNMP is enabled, a remote attacker may cause an unexpected application termination or arbitrary code execution. Description: “The CUPS backend SNMP program broadcasts SNMP requests to discover network print servers.”

CVE-2007-5850: This one covers desktop services in Mac OS X v10.4.11, Mac OS X Server v10.4.11. Leopard isn’t impacted. The gist: There’s a buffer overflow problem in Finder that can lead to an arbitrary code execution. Leopard not affected.

CVE-2007-5476: Affects the Flash Player plug-in for Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.1 and Mac OS X Server v10.5.1. There are multiple vulnerabilities addressed by Adobe.

CVE-2007-4131: This one corrects a “maliciously crafted tar archive,” an issue with GNU Tar. Affects Mac OS X v10.4.11, Mac OS X Server v10.4.11, but Leopard in the clear.

CVE-2007-5851: iChat is the issue here. The problem: A person on local network may initiate a video connection without permission. Leopard not impacted, but does cover Mac OS X v10.4.11 and Mac OS X Server v10.4.11.

CVE-2007-5853: IO storage issue where “opening a maliciously crafted disk image may lead to an unexpected system shutdown or arbitrary code execution. Leopard in the clear, but Mac OS X v10.4.11, Mac OS X Server v10.4.11 isn’t.

CVE-2007-5854: This one fixes launch services in Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.1, Mac OS X Server v10.5.1. The problem: “Opening a maliciously crafted HTML file may lead to information disclosure or cross-site scripting.”

CVE-2007-6165: Another launch services problem, this time “opening an executable mail attachment may lead to arbitrary code execution with no warning.” Affects Leopard and Leopard Server.

CVE-2007-5855: Affects mail on Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.1, Mac OS X Server v10.5.1. The problem: “SMTP accounts set up through Account Assistant may use plaintext authentication even when MD5 Challenge-Response authentication is available.”

CVE-2007-5116 and CVE-2007-4965: Addresses problems with perl and python, respectively. Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.1, Mac OS X Server v10.5.1 impacted.

CVE-2007-5856 and CVE-2007-5857: Both address Quick Look vulnerabilities in Leopard. Previewing a movie can disclose sensitive information. There are also some URL access issues.

CVE-2007-5770 and CVE-2007-5379, CVE-2007-5380, CVE-2007-6077: Vulnerabilities abound in Ruby libraries and Rails 1.2.3. The first one listed impacts. Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.1, Mac OS X Server v10.5.1. The remainder CVEs impact Leopard only.

CVE-2007-5858: A Safari fix for a information disclosure flaw. Impacts Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.1, Mac OS X Server v10.5.1. Also impacts Safari 3 Beta on Windows XP and Vista.

CVE-2007-5859: Safari RSS has issues on Mac OS X v10.4.11, Mac OS X Server v10.4.11. Maliciously crafted feed may lead to application termination or arbitrary code execution. Leopard not affected.

CVE-2007-4572, CVE-2007-5398: Addresses Samba vulnerabilities. Impacts Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.1, Mac OS X Server v10.5.1.

CVE-2006-0024: Addresses Shockwave woes in Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.1, Mac OS X Server v10.5.1.

CVE-2007-3876: Apple says: “A stack buffer overflow issue exists in the code used by the mount_smbfs and smbutil applications to parse command line arguments, which may allow a local user to cause arbitrary code. Impacts Mac OS X v10.4.11, Mac OS X Server v10.4.11.

CVE-2007-5863: Even Software Update has a few flaws. Leopard impacted by “a man-in-the-middle attack could cause Software Update to execute arbitrary commands execution with system privileges.”

CVE-2007-5860: Spin Tracer flaw affecting Leopard. “A local user may be able to execute arbitrary code with system privileges.”

CVE-2007-5861: Addresses Spotlight flaws. Affects Mac OS X v10.4.11, Mac OS X Server v10.4.11.

CVE-2007-1218, CVE-2007-3798: Vulnerabilities abound in tcpdump. Affects Mac OS X v10.4.11, Mac OS X Server v10.4.11.

CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768: Multiple vulnerabilities plugged in XQuery. Affects Mac OS X v10.4.11, Mac OS X Server v10.4.11.

Permalink • Print • Comment

Flash Action Photography

Agreed, pictures taken with flash aren’t as great as those taken under natural light, but sunlight also brings harsh shadows with it. To precisely light up those dark shadows, flash is a must. That is particularly true of outdoor action photography, be it car racing, roller skating or jet skiing. With the help of your flash, you can compensate for those fast moving environments with some well exposed images. That is achieved by using both the light of the flash to fill out the shadows, as well as, the natural light in your picture's scene. And it doesn't stop there! With slower shutter speeds, you can create some fantastic effects.

Here are a few out-of-the-box ways to capture action with flash photography. Try them out today!

Sync Your Flash Slowly

First of all, you should start experimenting with your flash. Add a slower shutter speed (slow sync flash, as they call it) for shots that capture the movement of the scene in your viewfinder in its natural ambient light. This will not only freeze certain details, but also make your pictures look great. The more you try using this feature, the better you will get!

Pan Your Way During Exposure

In addition to the above mentioned tip, try panning along with your subject as they move by and you’ll capture some interesting effects. You can capture blurred backgrounds, but the main subject will be supremely in focus, but of course, frozen by the flash. That greatly helps when you are trying to capture candid moments of bungee jumpers, boxers and acrobats.

Zooming Helps Too

This is another cool technique that could heighten the drama in your action shots, while freezing your subject with your flash. Just try zooming your lens in or out during the exposure to get a sense of movement in the shot.

Experimenting Doesn’t Hurt

It’s great to be creative. If you’ve used all the previous tips with some measure of success, you are ready for this next technique. First though, you need to check if your camera allows you to get the flash off the camera (if you are using an external flash). Most cameras allow you to rotate the camera into portrait mode and keep the flash above the camera. Try some off camera flash techniques to lighten your subject as they travel by from different angles. Putting the flash on the top helps to eliminate shadows. You can compare your shots with cialis shelf life the landscape position (flash on top) and the portrait position (flash on sideways) for shadows. When taking pictures of a person, the portrait position is always the best to use.

And Finally…

If you have control over the output of your flash (some point-and-shoots and most flash gun units allow this), experiment with a variety of different levels of output. You probably won’t need a full flash burst, so be sure to pull it back a stop or two to get a more natural look.

I wish you the best of luck. Remember, flash is where the action is!

Permalink • Print • Comment
Next Page »
Made with WordPress and an easy to customize WordPress theme • Sky Gold skin by Denis de Bernardy