XARA

From HandWiki - Reading time: 3 min

XARA is an acronym for "Unauthorized Cross-App Resource Access", which describes a category of zero-day vulnerabilities in computer software systems.

Initial Disclosure

An academic research paper entitled "Unauthorized Cross-App Resource Access on MAC OS X and iOS".[1] was published on 26 May 2015 by a team of researchers from Indiana University, Tsinghua University, Peking University, Chinese Academy of Sciences, and Georgia Institute of Technology. The paper was widely released to the public on 16 June 2015 [2] and commented on by both mainstream and technical media outlets.[3][4][5][6][7]

The paper identifies a number of separate categories of zero day threats to applications and stored passwords which can potentially be exploited by malware on iOS devices and OS X. The paper also discloses the existence of similar vulnerabilities on Android devices.

Response by Vendors

  1. On 19 June 2015, Apple Computer responded to the press[8] that they had implemented countermeasures to exclude malware containing the XARA exploit from their iOS App Store.

Attack Vectors

In XARA each attack vector violates the principles of a computer security sandbox.

  1. Untrusted partners using shared resources such file system, keychain.
  2. Inter-process communication without verification of partner.
  3. Weak security policies of system installer allow other applications to be designated as shared resource bundles.

Known systems with problems

  1. iOS from Apple Computer
  2. OS X from Apple Computer
  3. Android from Google

See also

References

  1. Xing, Luyi; Bai, Xiaolong; Li, Tongxin; Wang, XiaoFeng; Chen, Kai; Liao, Xiaojing; Hu, Shi-Min; Han, Xinhui (26 May 2015). "Unauthorized Cross-App Resource Access on MAC OS X and iOS". arXiv:1505.06836 [cs.CR].
  2. "Unauthorized Cross-App Resource Access on MAC OS X and iOS". 16 June 2015. https://drive.google.com/file/d/0BxxXk1d3yyuZOFlsdkNMSGswSGs/view?usp=sharing. 
  3. "Apple CORED: Boffins reveal password-killer 0-days for iOS and OS X". TheRegister. https://www.theregister.co.uk/2015/06/17/apple_hosed_boffins_drop_0day_mac_ios_research_blitzkrieg/. 
  4. "OS X and iOS Unauthorized Cross Application Resource Access (XARA)". Sans Technology Institute. https://isc.sans.edu/diary/OS+X+and+iOS+Unauthorized+Cross+Application+Resource+Access+%28XARA%29/19815. 
  5. "iOS and OS X Security Flaws Enable Malicious Apps to Steal Passwords and Other Data". MacRumors. http://www.macrumors.com/2015/06/17/ios-osx-cross-app-keychain-security-flaw/. 
  6. "Zero-Day Exploits for Stealing OS X and iOS Passwords". The Hacker News. http://thehackernews.com/2015/06/iphone-password-hacking.html. 
  7. "Zero-day exploit lets App Store malware steal OS X and iOS passwords". MacWorld. http://www.macworld.com/article/2937239/zero-day-exploit-lets-app-store-malware-steal-os-x-and-ios-passwords.html. 
  8. "Apple comments on XARA exploits, and what you need to know". imore.com. 19 June 2015. http://www.imore.com/xara-exploits-mac-iphone-and-ipad-and-what-you-need-know. 




Licensed under CC BY-SA 3.0 | Source: https://handwiki.org/wiki/XARA
5 views | Status: cached on October 05 2024 00:39:43
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF