Wednesday, November 01, 2006

Macbook Wireless Exploit

Proof of concept now available for Apple Airport Drivers via the new Metasploit module we listed below. Apple's security tower is crumbling now that more people are paying attention to it.

The Apple Airport driver provided with Orinoco-based Airport cards (1999-2003 PowerBooks, iMacs) is vulnerable to a remote memory corruption flaw. When the driver is placed into active scanning mode, a malformed probe response frame can be used to corrupt internal kernel structures, leading to arbitrary code execution.
Previously Apple, followed by others, had denied that Maynor and Ellch were actually able to crack a stock Macbook without third party peripherals. The proof is now in the Metasploit.

Link, Metasploit Module (via Kernel Fun)

No comments: