<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>— Jürgen Kreileder</title>
	<atom:link href="/articles/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Software Engineer and Consultant</description>
	<lastBuildDate>Sat, 29 Oct 2016 01:51:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">5303222</site><image><title>Jürgen Kreileder</title><url>/jk-rss.jpg</url><link>/</link><width>144</width><height>114</height><description>Software Engineer and Consultant</description></image>	<item>
		<title>OS X Applications Insecurely Installing World-Writable Files</title>
		<link>/articles/os-x-applications-insecurely-installing-world-writable-files/</link>
					<comments>/articles/os-x-applications-insecurely-installing-world-writable-files/#comments</comments>
		
		<dc:creator><![CDATA[Jürgen Kreileder]]></dc:creator>
		<pubDate>Sun, 17 Jul 2011 23:15:02 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[OS X]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[adium]]></category>
		<category><![CDATA[adobe]]></category>
		<category><![CDATA[emusic]]></category>
		<category><![CDATA[epson]]></category>
		<category><![CDATA[exploitable]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[hp]]></category>
		<category><![CDATA[lion]]></category>
		<category><![CDATA[osx]]></category>
		<category><![CDATA[permissions]]></category>
		<category><![CDATA[snow leopard]]></category>
		<category><![CDATA[telltale games]]></category>
		<category><![CDATA[world-writable]]></category>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=586</guid>

					<description><![CDATA[Files, directories, and devices that are writable by any user (&#8220;world-writable&#8221;) on a multi-user system can be dangerous locally exploitable security holes. There are very few legitimate reasons for having world-writable files and directories on a system. Many UNIX and Linux systems actually have cron jobs that check for world-writable files. On Apple&#8217;s OS X<br />[&#8594; <a href="/articles/os-x-applications-insecurely-installing-world-writable-files/" class="more-link">Read the rest of this entry</a>]]]></description>
										<content:encoded><![CDATA[<p>Files, directories, and devices that are writable by any user (&#8220;world-writable&#8221;) on a multi-user system can be dangerous locally exploitable security holes. There are very few legitimate reasons for having world-writable files and directories on a system.</p>
<p>Many UNIX and Linux systems actually have <em>cron</em> jobs that check for world-writable files. On Apple&#8217;s OS X there is no such safeguard and many vendors do not seem to care about file permissions much at all. Several well-known applications are either installed with world-writable files or create them when used:</p>
<h4>World-writable files in system directories</h4>
<p>The following applications install world-writable files in shared directories (<code>/Applications</code>, <code>/Library</code>,&nbsp;&#8230;):</p>
<ul>
<li><strong>Adobe CS 4, CS 5:</strong> Some uninstallers + several files and directories in /Library/Application Support + various stuff in other locations</li>
<li><strong>Adobe Media Player:</strong> directory + some files in <code>Contents/Resources</code></li>
<li><strong>Adobe Flash Player:</strong> directories (including <code>AddIns</code> und <code>AddIns/airappinstaller</code>)</li>
<li><strong>Amazon MP3 Downloader:</strong> some directories</li>
<li><strong>EPSON</strong> (Scan, TWAIN data source, Easy Photo Print, &#8230;): pretty much everything, including <strong>executables</strong></li>
<li><strong>Eye-One Match 3:</strong> complete app, including <strong>executable</strong></li>
<li><strong>eMusic Download Manager:</strong> complete app, including <strong>executable</strong> and JavaScript (the application is based on Mozilla)</li>
<li><strong>Telltale games</strong>: complete apps including <strong>executable</strong> and libraries</li>
<li><strong>Apple OS X</strong>: some plist and cache files, including at least one <strong>LaunchDaemon plist file</strong></li>
<li><strong>Google+Growl Utility</strong> (not a Google product): whole app including <strong>executable</strong></li>
<li><strong>HP Scan Pro</strong> (plus supporting files): everything including <strong>executables</strong></li>
<li><strong>DivX Converter:</strong> resource files</li>
<li><strong>Apple Remote Desktop:</strong> some plist files</li>
<li><strong>Apple GarageBand:</strong> several plist and data files</li>
<li><strong>Apple ColorSync:</strong> some profiles</li>
<li><strong>Microsoft Office 2011:</strong> directory in /Library Application Support</li>
<li><strong>Elgato EyeTV:</strong> several plist files</li>
<li><strong>ABBYY FineReader Sprint 8.0:</strong> several data files</li>
<li><strong>ArcSoft</strong> (Connect Suite, MediaImpression 2): all files, including <strong>executables</strong></li>
<li><strong>Extensis Suitcase Fusion 2</strong>: all files, including <strong>executables</strong></li>
</ul>
<h4>World-writable files in user directories</h4>
<p>The following applications install world-writable files in user directories (<code>/Users/<em>$USER</em></code>):</p>
<ul>
<li><strong>GoogleGrowl.plugin</strong>: whole plugin including <strong>executable</strong></li>
<li><strong>3rd-party extensions for Apple Safari</strong>: some extensions (e.g. AdBlock) install world-writable files</li>
<li><strong>Apple iPhoto</strong>: the whole library seems to be world-writable</li>
<li><strong>Adium add-ons</strong>: several add-ons install world-writable files</li>
<li><strong>eMusic Download Manager:</strong>some preferences files are world-writable</li>
<li><strong>Adobe</strong> (CS 4, CS5, Flash, &#8230;): several preferences files</li>
<li><strong>Apple MobileDevice</strong>: crash logs are world-writable</li>
</ul>
<p>The lists have been compiled by inspecting my own systems and those of several friends by running</p>
<pre>sudo sh -c \
  "find / -xdev -perm +o=w ! \( -type d -perm +o=t \) ! -type l -print0 | \
   xargs -0 ls -dl 2&gt;&amp;1 | \
   tee world-writable-files.txt"</pre>
<p>and analyzing the output.</p>
<p>Note that running <em>Disk Utility</em>&#8216;s &#8220;Repair Disk Permissions&#8221; does not have any influence on the issues described here.</p>
<p>Most OS X installations are probably single-user systems in reality but the situation is still somewhat ugly.</p>
]]></content:encoded>
					
					<wfw:commentRss>/articles/os-x-applications-insecurely-installing-world-writable-files/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">586</post-id>	</item>
		<item>
		<title>Facebook Chat Via XMPP Finally Supports TLS</title>
		<link>/articles/facebook-chat-via-xmpp-finally-supports-tls/</link>
					<comments>/articles/facebook-chat-via-xmpp-finally-supports-tls/#comments</comments>
		
		<dc:creator><![CDATA[Jürgen Kreileder]]></dc:creator>
		<pubDate>Sun, 24 Apr 2011 17:29:57 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[tls]]></category>
		<category><![CDATA[xmpp]]></category>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=489</guid>

					<description><![CDATA[Looks like Facebook silently introduced encryption for chats in XMPP/Jabber clients (Pidgin, Adium, etc.): Its servers now support the use of TLS as defined in RFC 3920. Facebook&#8217;s FAQs (1, 2) have not been updated accordingly yet.]]></description>
										<content:encoded><![CDATA[<p>Looks like Facebook silently introduced encryption for chats in <abbr title="Extensible Messaging and Presence Protocol">XMPP</abbr>/Jabber clients (<a href="http://www.pidgin.im/">Pidgin</a>, <a href="http://adium.im/">Adium</a>, etc.): Its servers now support the use of <abbr title="Transport Layer Security">TLS</abbr> as defined in <a href="http://xmpp.org/rfcs/rfc3920.html#tls">RFC 3920</a>.</p>
<p>Facebook&#8217;s FAQs (<a href="https://www.facebook.com/help/?faq=16739">1</a>, <a href="https://www.facebook.com/help/?faq=16740">2</a>) have not been updated accordingly yet.</p>
]]></content:encoded>
					
					<wfw:commentRss>/articles/facebook-chat-via-xmpp-finally-supports-tls/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">489</post-id>	</item>
		<item>
		<title>wordpress.org Cracked, Exploit in 2.1.1 Release</title>
		<link>/articles/wordpress-org-cracked-exploit-in-2-1-1-release/</link>
					<comments>/articles/wordpress-org-cracked-exploit-in-2-1-1-release/#comments</comments>
		
		<dc:creator><![CDATA[Jürgen Kreileder]]></dc:creator>
		<pubDate>Sat, 03 Mar 2007 03:08:33 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[WordPress]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[rant]]></category>
		<guid isPermaLink="false">http://blog.blackdown.de/2007/03/03/wordpressorg-cracked-exploit-in-211-release/</guid>

					<description><![CDATA[As pointed out on the WordPress development blog, a cracker gained access to the wordpress.org servers and replaced the 2.1.1 download with a modified exploitable version. The exploitable download may have been on the site for three or four days! It may be a good idea for the WordPress developers to sign their releases with<br />[&#8594; <a href="/articles/wordpress-org-cracked-exploit-in-2-1-1-release/" class="more-link">Read the rest of this entry</a>]]]></description>
										<content:encoded><![CDATA[<p>As pointed out on the <a href="http://wordpress.org/development/2007/03/upgrade-212/">WordPress development blog</a>, a cracker gained access to the wordpress.org servers and replaced the 2.1.1 download with a modified exploitable version. The exploitable download may have been on the site for three or four days!</p>
<p>It may be a good idea for the <a href="http://wordpress.org/" rel="tag">WordPress</a> developers to sign their releases with a well known and trusted PGP key. This would allow people to verify that downloaded files are really what they should be!<br />
This is a well-established practice used by other projects, for example by the <a href="http://kernel.org/signature.html">Linux kernel</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/articles/wordpress-org-cracked-exploit-in-2-1-1-release/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">49</post-id>	</item>
	</channel>
</rss>
