A recent vulnerability was discovered with the third party Mac security tools such as Google Santa, Little Snitch, xFence, Facebook OSquery, Yelp’s OSXCollector, Carbon Black’s Cb response and several other Objective See’s Tools.
Apple later informed that it was not a fault in their protocols but a flaw in the third-party Mac security tools. The third party Mac security tools failed to properly implement the security checks that allowed the software to be signed as apple software.
A software program has to undergo many security checks before it is allowed in the app store for the user. To authenticate the software apple conducts a series of checks and later signs the code. This Signature by Apple is a seal of approval that helps the user when trusting new software. With this signature the user does not have to worry about security breaches.
The Executable file is checked by Third party Mac security tools. The flaw was discovered when it was found that the Third Party security tools were not properly checking each component in the Fat/Universal file.
The multiple binary codes that a Fat file contains in form of a executable Mac file and is targeted towards a particular CPU type. Thus, the file can run on different CPU architecture types with having different application versions in the same code.
To pass as authentic software the malicious files could be constructed in a manner where the Third Party Mac Security Tools allowed the code with apple signature.
To correct the situation third party developers should use kSecCSStrictValidate and kSecCSCheckAllArchitectures with SecStaticCodeCheckValidity API. It will update the developer documentation for the code. With this apple also said that the developers need to check the full universal binary code and confirm that the identities are the same throughout to have a positive outcome. The developers should also use –R=’anchor apple’ flag to codesign to properly check all the binary files in the FAT file and not just the first binary.
Before disclosing the bug, the 3rd Party Application Vendors were contacted and this issue was resolved to minimize the impact. Some vendors may have been left out but the issue will be patched with a small update from the vendor side.
These files were updated with the new patch to stop malware to appear as apple software.
Hits: 64
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.