OS X sandboxing flaw casts doubt on upcoming Mac App Store requirementA newly-discovered security flaw in the sandboxing functionality of Mac OS X has prompted concerns over Apple's requirement that all applications submitted to the Mac App Store must implement sandboxing by March 2012.
Security research firm CoreLabs Research recently disclosed a potential vulnerability in Apple's desktop operating system, ArsTechnica reported on Friday.
Sandboxing provides a method for an operating system to restrict which system resources are available to an application. According to the security firm, vulnerabilities in the feature extend to the three latest releases of Mac OS X: Leopard, Snow Leopard and Lion.
"Several of the default pre-defined sandbox profiles don't properly limit all the available mechanisms and therefore allow exercising part of the restricted functionality," the vulnerability's description read.
In particular, an application without approved network access could send Apple events "to invoke the execution of other applications not directly restricted by the sandbox." The firm also noted that the issue resembles one reported by famed security expert Charlie Miller at the Black Hat Japan security conference in 2008. Apple apparently fixed the mentioned issue, but neglected to "modify the generic profiles."
Apple had originally required all submitted Mac App Store apps to support sandboxing by this month, but the company recently pushed the deadline back to March of next year.
"As of March 1, 2012 all apps submitted to the Mac App Store must implement sandboxing," Apple reportedly said in an email to developers, as noted by TUAW.
The Cupertino, Calif., company is implementing the policy in an effort to maintain security on the Mac App Store, but a number of developers have complained that the rule is overly restrictive. The recently revealed vulnerability has only added fuel to their cause, as some assert that the sandbox requirement is flawed because sandboxing itself is vulnerable.
Some have also taken issue with how Apple has handled the news of the vulnerability. Core notified Apple of the issue in September to allow ample time for it to address the issue before going public with the problem. According to the firm, Apple responded that it "does not see any actual security implications" because documentation for the NoNetwork sandbox profile does not actually promise that Apple events will be blocked.
Core replied that the vulnerability allows Apple events to eventually execute sockets-based networking, which is supposed to be blocked by the NoNetwork sandbox profile. Apple then agreed to modify its documentation to make note of the issue.
While the Mac App Store is only one option for adding software to a Mac, some critics of Apple's restrictions have voiced concerns that the company could move toward the iOS model. The App Store on iOS is currently the only legitimate source for applications on the mobile OS.
For its part, Apple has moved its own software onto the Mac App Store, even going so far as to launch Mac OS X Lion exclusively on the store in July. The company also released Final Cut Pro X in June only on the Mac App Store.
On Topic: Software
- Skype cloud shift will require OS X Yosemite or iOS 8 for full support on Apple devices
- MacKeeper threatens 14-year-old YouTube video maker with harassment suit
- Adobe releases Photoshop and Premiere Elements 14 for Mac with new tools
- Parallels Desktop 11 launches with support for El Capitan, Windows 10, Cortana and more
- Adobe releases Photoshop and Premiere Elements 13 for Mac with new editing tools