Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
That's f'n rich!

We write crappy code that isn't W3C Compliant nor ECMA Compliant; and that uses a database that can't scale for crap and they want Apple to patch a workaround to cover their ignorance?
 
What an absolute horrible world this person has to live in due to his/her imagination. I can't imagine the burden of paranoia this individual has to carry every day.

It would not be to hard to imagine this individual wearing disguises as he or she interacts with real people in the real world.

I'm not sure of his/her gender, because I am convinced he/she would lie about it, so as not to reveal anything about himself/herself.

It is really quite sad. I really wish this person could just take a month, stay away from the internet and college campuses, go out into the real world and enjoy life. This burden is too much to carry for very long.

Wow man, get a sense of humor, this link was meant to be a joke. I just found it rather amusing that people were using this forum to debate which is a better social network to use? Who cares, what does this have to do with apple, and rumors surrounding apple? At any rate, social networking is designed for bored kids with nothing better to do, the link was posted purely for it's ridiculousness. Oh and also, I do enjoy life. There is just more to it than being spammed by webcam hoes, and Phishers on myspace/facebook/ any number of those lame sites. Thank you that is all.
 
This was Tom's latest blog entry:

Tuesday, December 05, 2006


get the quicktime update
Current mood: cranky
Category: MySpace

the security problems this weekend were related to a hole in activex quicktime installer.

you can read about it on cnet here:

http://news.com.com/MySpace+to+Apple+Fix+that+worm/2100-7349_3-6141031.html

if you've got the quicktime player (and you probably do, if you have itunes) or watch movies, then you need to click on the update link that you'll see on your homepage. by updating quicktime you can protect yourself on myspace and any other website.

yes the link/update is legit, and yes the message about it on your homepage is really from me.

if you don't see the message on your homepage, it's because a) you don't have quicktime and therefore dont need to install the update, b) you've already updated.

you cannot get the update from quicktime's webstie yet. get it here.

some people have asked about the active x popup they see on the page when you're prompted to install. yes it should be there.. just allow it to go thru and install.

I tried to comment on the problem and it gave me an error twice. The third time it accepted it, but strangely, none of the comments are visible to the public. :rolleyes:
 
good for Apple making an effort to take care of this quickly after being notified... myspace is a popular "cool" site that could definitely hurt the image of Apple among the younger generations if they wanted too. Although a worm that destroyed myspace might not be the worst thing in the entire world.
 
Whether or not MySpace should allow users to modify CSS is a separate argument. In my opinion it's extremely stupid of them to do it - this has made it extremely easy for bad guys to exploit an open Firefox flaw and now this Quicktime flaw. But, in the end, they ARE flaws in Firefox and in Quicktime (matter of fact, the Quicktime flaw is rather similar to the Firefox flaw).

I don't have a problem with allowing users to modify CSS to customize their personal pages. I help run a community site that is absolutely dwarfed by MySpace (about 1200 active users), and we allow our users to have their own CSS. People love using it to customize the look of their pages.

What MySpace should do is get rid of all embedded content. No QuickTime or Flash, no vulnerability. We disallow <embed>, <object>, <iframe>, <script>, and others. We also filter out some of the sneakier ways to inject javascript into a page, such as within links or CSS url() constructs.

Of course, MySpace would never do that, because half their popularity is probably based on being able to put annoying Flash and other content on your page. So they try to bully the plugin makers instead...

Edit: forgot to add that it appears that the above Firefox flaw has nothing to do with CSS. It's simply that they allow a user to put the <form> tag into their own page.
 
Where is the XSS interpreted? If it is interpreted on the client side, I stick to the belief that this is fundamentally a client-side issue and not a MySpace issue. The problem lays with the browser Javascript engine and/or QT. But if the script is being executed on the server, certainly it's a MySpace issue.

The issue isn't where the code is interpreted. Of course it's interpreted by the client, because it uses javascript to inject itself into the user's own profile. That doesn't mean the client contains any vulnerability.

The security rules for the client are very simple: do not allow javascript from one site to send data to another site. A client vulnerability would be one that allows a malicious javascript on some MySpace user's page to send your MySpace login info to an external site, without your knowledge. All current browsers should be immune to such an attack. That is all they should be responsible for in terms of cross site scripting.

Think about when you browse store.apple.com. If that site has any javascript in it, do you think it's a security problem if that javascript sends information about your store.apple.com experience back to store.apple.com? Of course not. Apple has full control over the site, so if their own javascript sends information about your browsing experience at their site, that's inherently information they already had access to. No security problem, on the client or otherwise.

The MySpace problem is that they allow users to customize pages on myspace.com -- each user's own personal page belongs to myspace.com, after all. In doing so, it is their responsibility to filter out any type of scripting attempt from user-submitted content.

See, visiting a user's MySpace page is very different from visiting a page at Apple's website. On Apple's site, every script and movie is put there by Apple. They develop it with a unified purpose in mind, and check it over before it goes live. Even if it erroneously sends bad information to the site, the worst that can happen is that your browsing experience on their site is a little clunky.

Contrast that with MySpace, where much of the content is user-uploaded, and is not designed or checked by human eyes working for MySpace. Moreover, it's a site where you, the visitor, may have your own little area that you can upload to (if you have a MySpace account). Now, when a script causes your browser to send certain information to myspace.com, that information could be crafted to modify your MySpace account. And the script could have come from someone completely outside of MySpace (the company), with malicious intentions to do funny things to your account.

This is completely, 100% a MySpace issue. They allow their users to upload content which is then viewed by anyone who sees the user's page. Thus it is their responsibility to filter that content so that any script which could modify the viewer's own account is completely removed.

As I said in my previous post, MySpace could do the right thing and disallow all embedded content like Flash, QuickTime, Windows Media, etc. That removes this vector for inserting a script into a MySpace page. Of course they won't, because that's at least half the appeal of their godawful site, so they bully the plugin makers instead.
 
Looks like us QuickTime on the Mac or Safari users aren't affected-as the upgrade page uses IE ActiveX.

Gee, imagine if (back while it was supported) MS IE for Mac had a problem like this. How long, do you suppose, it would take MS to respond to such a problem, when it didn't effect their main product line / OS? I think that Apple deserves good kudos for jumping right on this.

(Of course, I find it a little curious to learn that QT uses ActiveX at all, but I'm sure Apple has its reasons.)
 
Die myspace Die. I'm tired of my roommate being on for literally 6 hours straight each day... Die Myspace Die!

Well, what does he do there? I've actually found a ton of new local bands and 'undiscovered' music. Now, if MS would just get enough servers to support the stupid thing. :)
 
Every once in a while you get a story here that really exposes the Mac fanboyz and makes me cringe. This is one of them.

Folks, this vulnerability isn't MySpace's fault. You can bitch all you want about how crap their website is, and how they're not HTML compliant, and blah blah, but the fact remains, this is a Quicktime vulnerability that TARGETS MySpace users specifically. That's hardly the fault of MySpace. The fact that the website is so popular makes it a target, and the fact that Quicktime had this vulnerability made Quicktime the means through which some loser hacker attacked the target.

Yet 90% of the comments here are "it's not Apple's fault because I hate MySpace and so it must be MySpace's fault!" Folks, I hate MySpace too, but please don't embarrass the rationally-thinking mac users by posting baseless ill-informed diatribes on how this is all MySpace's fault. It's an Apple security hole and they're fixing it. End of story.
 
Wow man, get a sense of humor, this link was meant to be a joke. I just found it rather amusing that people were using this forum to debate which is a better social network to use? Who cares, what does this have to do with apple, and rumors surrounding apple? At any rate, social networking is designed for bored kids with nothing better to do, the link was posted purely for it's ridiculousness. Oh and also, I do enjoy life. There is just more to it than being spammed by webcam hoes, and Phishers on myspace/facebook/ any number of those lame sites. Thank you that is all.

I appologize, you did not state that the link was a blog of yours. My comments were not directed at you but at the blogger. If I had realized that you were the author, I would not have said anything.
 
The MySpace problem is that they allow users to customize pages on myspace.com -- each user's own personal page belongs to myspace.com, after all. In doing so, it is their responsibility to filter out any type of scripting attempt from user-submitted content.

I think I'm understanding you... and thank you for bearing with me and explaining... but I'm going to ask to dip into that bank one more time. :D

I understand what you are saying that, when one goes to a site like apple.com, they know that the site is "credible" and won't have malicious code in it. But while MySpace seems like it might be such a site, it isn't, because users are allowed to insert embedded content that isn't really effectively filtered by MySpace.

And so when a user goes to MySpace, they become vulnerable to an exploit using Javascript that was put there by a user and was not controlled by MySpace, correct? That exploit happens client-side on the client's browser, but it only happens because the client loaded the MySpace page in the first place. So if the client stayed off MySpace, the problem would never occur.

What I'm trying to say is that I do not believe that is a good or sufficient standard for defining a vulnerability. My standard (the issue of phishing aside) is that a user should be able to go to *any* web page on the internet and should not be vulnerable to either:

(A) that website installing executable code on the client without permission
(B) an unauthorized transmission of information to that website.

It seems from what I understand that there is a true vulnerability here in that, even if MySpace filtered their website effectively, any other website could be infiltrated with the same malicious code involved here, and users who either purposely or inadvertently (e.g. through a pop-up that wasn't blocked) go there would be vulnerable to the same attack.

So I still don't think it's reasonable to say that this is a MySpace only issue... because the impact is on the level of the client, and any other website that implemented the same code would have the same effect.
 
Well, what does he do there? I've actually found a ton of new local bands and 'undiscovered' music. Now, if MS would just get enough servers to support the stupid thing. :)

The first day we met he did this: "Oh dude check out this 'hottie' i'm gonna write her: 'hey darling I just moved here from london will you show me around" And that lasted about 6 hours that one day him telling me about a new "hottie" ever 5 seconds...

Really do girls really like guys that have their own flat iron? Seriously?
 
Yet 90% of the comments here are "it's not Apple's fault because I hate MySpace and so it must be MySpace's fault!" Folks, I hate MySpace too, but please don't embarrass the rationally-thinking mac users by posting baseless ill-informed diatribes on how this is all MySpace's fault. It's an Apple security hole and they're fixing it. End of story.

Disagree 100%. I cringe right along with you at most of the blatant fanboy stuff around here. But this is solely MySpace's flaw. The fact that QuickTime is used as a vehicle is no different than if a simple HTML link were used as the vehicle. Should we have all web browsers remove a potentially dangerous feature (web links) because they can be abused by malicious users on sites that don't filter their content? Of course not! Asking Apple to do the same with QuickTime is no different.

In the case of web links, MySpace took responsibility and designed their software to filter out malicious scripting attempts from links. They need to step up and do something similar to handle QuickTime, Flash, Windows Media, and whatever other garbage they allow users to post directly to their sites. Apple may be playing nice by working with MySpace to give them an easier method to filter out malicious uploads, but it is still 100% MySpace's responsibility to do so.

Like I said last night, at a community site I help run, we do it the easy way: we don't allow users to embed anything like QuickTime, Flash, etc into their pages. Problem solved. We took responsibility and closed the hole on our site.
 
And so when a user goes to MySpace, they become vulnerable to an exploit using Javascript that was put there by a user and was not controlled by MySpace, correct? That exploit happens client-side on the client's browser, but it only happens because the client loaded the MySpace page in the first place. So if the client stayed off MySpace, the problem would never occur.

Exactly. And moreover, if the client doesn't themselves have a MySpace account, there's nothing for the malicious script to vandalize. No exploit, period, in that case. I can visit any malicious MySpace page I want, because I've never registered there, so I don't have a profile that can be vandalized with these methods.

This is kind of an aside, but I really believe that the term "cross-site scripting" to describe this type of vulnerability is a huge misnomer. It's only "cross-site" if the script were somehow able to send information from one site to a completely different site. It is definitely the browser's responsibility to make sure this never happens, and I'm not aware of any open vulnerabilities in the latest browsers that do this.

A true cross-site vulnerability is one where you visit somebody's MySpace page, and a malicious script causes your browser to send your banking website's login creditials to that user's site somehow. All browsers should prevent this sort of attack because any site other than your bank's website has no right to that information.

My standard (the issue of phishing aside) is that a user should be able to go to *any* web page on the internet and should not be vulnerable to either:

(A) that website installing executable code on the client without permission
(B) an unauthorized transmission of information to that website.

Ok, that's fine. The first one, if it were to happen, would be 100% a browser bug. No browser should install and/or execute unknown code without your consent.

The second one depends on your definition of "unauthorized." If you mean "in the background" then removing this feature breaks a lot of recent advances in web scripting technology, collectively known as AJAX. AJAX is here to stay (and to make our lives easier!), and the convention from the start has been that no browser should be able to send any information to a website that didn't originate from that same website -- whether information from your hard drive or from a different website. The definition of "unauthorized" has always been "information that didn't originate from the same site." That is not the same as "unwanted" which is what you may be thinking of. Unfortunately, there is no possible way for a browser to determine what is "unwanted."

It seems from what I understand that there is a true vulnerability here in that, even if MySpace filtered their website effectively, any other website could be infiltrated with the same malicious code involved here, and users who either purposely or inadvertently (e.g. through a pop-up that wasn't blocked) go there would be vulnerable to the same attack.

So I still don't think it's reasonable to say that this is a MySpace only issue... because the impact is on the level of the client, and any other website that implemented the same code would have the same effect.

It's not a MySpace-only issue in the sense that any site that displays user-uploaded content must check and filter out any malicious scripting attempts. Any community site where registered users may upload content to their own pages must face this same issue, but it's still the site's responsibility.

It can't possibly be a browser issue because the browser is still following the rules all along: any information it sends to MySpace also originated from MySpace. The browser cannot possibly be smart enough to know that this area of MySpace (some malicious user's page) isn't authorized to touch that area of MySpace (the viewer's profile settings). This is not (in my opinion) a true "cross-site" vulnerability which is the responsibility of the browser because information never leaves myspace.com.

Consider this scenario: Apple adds a feature to .Mac where it can list your favorite new Apple products. You can add products to your favorites list manually, or whenever you view a particular product's page multiple times, it has a script which adds that product to your list in the background, automatically. So in essence, the product area of Apple's website is making scripted changes to the .Mac area.

Is this unauthorized? Is it a vulnerability? No. Apple designed it to work that way, and your browser is still only sending information to and from apple.com.

Now, if Apple allowed any third-party accessory manufacturer to write their own product pages and place them on Apple's site, we'd have the same type of vulnerability. Let's say Bose places a malicious script on their product pages, on apple.com which removes all competitors' products from your .Mac favorites list. This is exactly what's going on at MySpace. In the hypothetical Apple case, it is Apple's responsibility to make sure their accessory suppliers can't add these things to pages on apple.com. Just as MySpace has the responsibility to make sure that their users can't add malicious scripts to pages on myspace.com.
 
The fact that QuickTime is used as a vehicle is no different than if a simple HTML link were used as the vehicle. Should we have all web browsers remove a potentially dangerous feature (web links) because they can be abused by malicious users on sites that don't filter their content?

nice try with the apples and oranges comparison. Quicktime, an app that is provided by a single vendor, is hardly the same as web links, an HTML standard. Lots of FUD from this guy, folks, move on.
 
nice try with the apples and oranges comparison. Quicktime, an app that is provided by a single vendor, is hardly the same as web links, an HTML standard. Lots of FUD from this guy, folks, move on.

FUD? Give me a break. :rolleyes:

QuickTime has a feature that allows the user to click on the movie and send the browser to a web destination. That is the feature that's being used here, and it's the only feature of QuickTime that's relevant to this issue. In this context, it's exactly like a standard HTML link. Apples to apples.

The fact that QuickTime comes from a single vendor changes nothing. Like many other standard web features (links, forms, buttons, images, CSS, etc), it can be abused by users who are allowed to upload their own content to a website they don't own. The QuickTime HREF track is no less secure than any of these other web features, period. It is not Apple's responsibility to remove or cripple a perfectly working feature because sites that are setup to display foreign-originated content are too lazy to filter that content. Just as the standards bodies who developed the HTML+CSS specifications do not have that responsibility with respect to their features either.

I really don't care that this is associated with an Apple product. I don't care that it's MySpace, which I'm not fond of. I'd say the same thing if it were a Microsoft, Adobe, or some free/standards-based feature being exploited on Google, Yahoo, LiveJournal, or any other community site.

The owner of any community site with user-generated content must take steps to ensure that that content does not cause harm to the other users' data. The site I help run does it, so can MySpace if they want to.
 
I hate MySpace's crummy coding as much as the next person. Ever since the summer I've gotten numerous error messages when clicking a link, or the music doesn't play/download/add to my profile as it's supposed to. And there's the pages where I can barely scroll down due to all the junk making Safari crawl. That said, IMO it's ignorant to keep stating that it's nothing but a stupid teen hangout. I'm past those years, but as someone who loves indie Brit music, I'm very grateful to MySpace for allowing me to discover bands I'd never have known otherwise. My faves don't even have a record deal at the moment, but thanks to MySpace (and Wiretap Pro) ;) I have at least some of their songs on my iPod. Like it or not, it really has made a difference in exposure for bands.

Kudos to Apple for doing what they can to fix the problem.
 
no wonder there are lot of sex predators on myspace and etc it don't have efficient security to protect itself..

two thumbs up apple.. :D
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.