Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
What really is the practical risk though? From the Ars article:

As a result, attackers with the ability to manipulate the traffic passing between the end user and the server—say, an adversary on the same Wi-Fi network—can inject malicious code into the communication.
 
Transmission has not been updated since June 2014 (latest version is 2.84). You actually have to use the nightly builds to get decent Yosemite+ support. I looked at the “appcast” feed they are using and it seems that they are indeed on the red list: they load the patch notes through separate HTTP URLs within the feed. This is the big issue of the vulnerability.



Which is indeed a good thing. But it just goes to show that OS X does not work on fairy dust and that even Mac developers are lazy or negligent.
Any recommendation for a torrent program that actually updates and is currently not on the list?
Maybe Deluge?
 
Any reason why more apps don't use the App Store?

I've asked Team Viewer, VLC and Skype to deliver via the App Store but as you can see, my requests were in vain.

Also, I wish OS X apps would put the "Check For Updates" button in a consistent location (This is another example of lack of attention to consistency and detail.)
 
Any reason why more apps don't use the App Store?

I've asked Team Viewer, VLC and Skype to deliver via the App Store but as you can see, my requests were in vain.

Also, I wish OS X apps would put the "Check For Updates" button in a consistent location (This is another example of lack of attention to consistency and detail.)
Lack of detail as far as who is concerned? Third party apps develop things to their liking so they can put things where they feel appropriate for them.
 
Transmission has not been updated since June 2014 (latest version is 2.84). You actually have to use the nightly builds to get decent Yosemite+ support.
Right, I use nightly build. 2.84 (14306) Thank you. Works fine though. Tick "Include beta releases" at the bottom to get it.

Screen Shot 2016-02-10 at 09.27.26.png

[doublepost=1455091616][/doublepost]
Crap... I use VLC all the time.
Latest version is ok. VLC is one of my favourites.
[doublepost=1455092028][/doublepost]
No one loves Vuze? :D
Didn't try it, Transmission works fine for me.
[doublepost=1455092269][/doublepost]
Put things into perspective - this isn't going to affect many people who currently have apps that use Sparkle.
Remember, always be afraid anyway. Also remember War Is Peace, Freedom Is Slavery, And Ignorance Is Strength.

homeland.jpg
[doublepost=1455092526][/doublepost]
How did you check what version it uses?

Run one of the scripts suggested on page 1 of this thread. ;)
 
Last edited:
Does the attacker uses this security hole to install malicious software on the computer or is it only to execute commands? So, the Sparkle was capable of executing commands remotely on computers with apps using it to install updates?
 
I have a robust list, unfortunately. :(

  • Arq
  • Blocs
  • DXOOpticsPro10
  • Geekbench 3
  • Geekbench
  • OpenDNS Updater
  • RapidWeaver4
  • Sandvox
  • Snagit
  • TextExpander
  • Transmit
  • TurboTax Deluxe 2014
  • TurboTax Deluxe 2015
  • Winclone
[doublepost=1455102570][/doublepost]
I don't think I ever downloaded a single app on my Mac lol. Just been using the stock ones for 4 years now.
Wow, I guess you're ok then - you're risk is minimal. As for the rest of us, who use the computer a but more, its a more of an issue

As long as you can trust your DNS it should be fine.
I'm on openDNS, so that should hopefully help me a but more.

Any reason why more apps don't use the App Store?
Because of Apple's stringent policies, not letting developers access certain APIs,
No upgrades mechanism
Taking 30%
Lately, not seeing the value, the app store is not something that is giving developers much advantages.
 
So is there any risk if your mac never leaves the house and stays on your own secured network?
I think the risk is that the automatic updates can introduce a man in the middle attack. IT doesn't matter if your Mac never leaves the house or your network, the vulnerability is in the app, so when it gets updated, you could be introducing malware into your system.
 
Nice that your article points / links to another article (posted 11 days ago) that provides instructions on how to exploit this vulnerability in the name of awareness.

One response says it,
Actually, you didn't say enough. You left out, "altering the contents of someone's computer in the United States without their permission is a violation of the Computer Fraud and Abuse Act, and possibly other state computer trespass statutes, so doing this is violating the law." Ethically, you have not justified distributing such a capability to people who you are encouraging break the law with the "have fun" smiley-face closing to your post. How is handing a simple exploit technique to people helping the situation? Promoting simple exploitation is easy. Helping provide solutions and promoting more secure ways of doing things is hard. Please use your skills to do the hard thing, don't take the easy way out just to get retweets.​
 
As I side note, I encountered my first piece of malware on my Mac. I have no idea how I got it, but Safari was frozen with a repeating string of pop-ups telling me I had malware installed. A quick call to Apple's tech support resolved it. But it caught me by surprise.

Are you sure this was legitimate? The same thing happened to me today. I hope you didn't call the number shown in the pop-up, as this is certainly a scam.

If it happens again, force quit Safari and then reopened it without restoring tabs, by holding Shift as you launch the app.
 
find /Applications -name Sparkle.framework | awk -F'/' '{print $3}' | awk -F'.' '{print $1}'

I found

BlackMagic ATEM Switchers
Cyberduck
DiskMaker X 5
VLC
 
To circumvent that, you need to move to one of you other virtual desktops and click the safari icon on your dock. Basically you need to make that hidden popup come out, dismissing it will "unfreeze" safari.
Interesting. The Apple technician had me shift-click on Safari, which allowed it to open normally. Then ironically she had me download Malwarebytes -- which is one of the currently affected pieces of software!
 
This is why the app store was a good thing

No, the App Store - at least not in the way that Apple implemented it - is NOT a good thing, for a rather long list of reasons. The App Store (and its lack of support for paid updates and upgrades) is not only an economic problem for software developers, it also did not prevent several malware from being distributed through it. Just Google for something like "apple app store malware" and you will find plenty of articles about it.

That being said, nothing is perfect, but I'd rather live with an occasional security issue with Sparkle and other installers/update tools than with a system where the monopolistic App Store would be the only means of obtaining and installing software.
[doublepost=1455113354][/doublepost]
OS X isn't safe no more.

It never was safe. There only was a time when its market share was so insignificant that nobody bothered exploiting its vulnerabilities. That time is gone and now people wake up to the reality that they bought into hype and marketing -- and that Apple's platform is by no means safer than Microsoft's. However, just to get this straight, a vulnerability is Sparkle is not a vulnerability in OS X itself.
 
From what I see from the list, I have:

App Cleaner
Better Touch Tool
Handbrake
ClamXav
Paintbrush
Jumpcut
Crossover
Malewarebytes
Adium
Carbon Copy Cloner
VLC
 
does blocking the apps that is infected from doing outgoing connection through little snitch will solve the problem ?
also does using vpn all the time also prevent being infected ?
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.