XARA

XARA is an acronym for "Unauthorized Cross-App Resource Access", which describes a category of zero-day vulnerabilities in computer software systems.

Initial Disclosure

An academic research paper entitled "Unauthorized Cross-App Resource Access on MAC OS X and iOS".[1] was published on 26 May 2015 by a team of researchers from Indiana University, Tsinghua University, Peking University, Chinese Academy of Sciences, and Georgia Institute of Technology. The paper was widely released to the public on 16 June 2015 [2] and commented on by both mainstream and technical media outlets.[3][4][5][6][7]

The paper identifies a number of separate categories of zero day threats to applications and stored passwords which can potentially be exploited by malware on iOS devices and OS X. The paper also discloses the existence of similar vulnerabilities on Android devices.

Response by Vendors

  1. On 19 June 2015, Apple Computer responded to the press[8] that they had implemented countermeasures to exclude malware containing the XARA exploit from their iOS App Store.

Attack Vectors

In XARA each attack vector violates the principles of a computer security sandbox.

  1. Untrusted partners using shared resources such file system, keychain.
  2. Inter-process communication without verification of partner.
  3. Weak security policies of system installer allow other applications to be designated as shared resource bundles.

Known systems with problems

  1. iOS from Apple Computer
  2. OS X from Apple Computer
  3. Android from Google

See also

References

  1. Xing, Luyi; Bai, Xiaolong; Li, Tongxin; Wang, XiaoFeng; Chen, Kai; Liao, Xiaojing; Hu, Shi-Min; Han, Xinhui (26 May 2015). "Unauthorized Cross-App Resource Access on MAC OS X and iOS". arXiv:1505.06836 [cs.CR].
  2. "Unauthorized Cross-App Resource Access on MAC OS X and iOS". 16 June 2015. Retrieved 18 June 2015.
  3. "Apple CORED: Boffins reveal password-killer 0-days for iOS and OS X". TheRegister. TheRegister. Retrieved 20 June 2015.
  4. "OS X and iOS Unauthorized Cross Application Resource Access (XARA)". InfoSec Handlers Diary Blog. Sans Technology Institute.
  5. "iOS and OS X Security Flaws Enable Malicious Apps to Steal Passwords and Other Data". MacRumors. MacRumors. Retrieved 20 June 2015.
  6. "Zero-Day Exploits for Stealing OS X and iOS Passwords". The Hacker News. The Hacker News. Retrieved 20 June 2015.
  7. "Zero-day exploit lets App Store malware steal OS X and iOS passwords". MacWorld. MacWorld. Retrieved 20 June 2015.
  8. "Apple comments on XARA exploits, and what you need to know". iMore. imore.com.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.