Greenguy's Board


Go Back   Greenguy's Board > Chit Chat
Register FAQ Calendar Today's Posts

Reply
 
Thread Tools Search this Thread Rate Thread Display Modes
Old 2010-03-29, 02:53 PM   #1
terry
You can now put whatever you want in this space :)
 
terry's Avatar
 
Join Date: Apr 2004
Location: Montreal
Posts: 5,883
Send a message via ICQ to terry
Apple plugs 88 Mac OS X security holes

Apple today released one of its biggest Mac OS X security updates in recent memory, covering a whopping 88 documented vulnerabilities.

The Mac OS X v10.6.3 update, which is considered “critical,” covers flaws that could lead to remote code execution, information disclosure and denial-of-service attacks.

In some scenarios, a malicious hacker could take complete control of a Mac-powered machine if a user simply views a malicious image or movie file.

In another case, a Mac user running spell-check could have his/her machine hijacked by hackers.

The update covers critical vulnerabilities in AppKit, QuickTime,CoreMedia, CoreTypes, DiskImages, ImageIO and Image RAW.

It also covers holes in several open-source components, including Apache, ClamAV, MySQL, PHP.

ZD Net has the full article, click here.
terry is offline   Reply With Quote
Old 2010-03-29, 03:23 PM   #2
Cleo
Subversive filth of the hedonistic decadent West
 
Cleo's Avatar
 
Join Date: Mar 2003
Location: Southeast Florida
Posts: 27,936
I installed it earlier today. It was almost a half a gig in size.

So far everything seems exactly the same.
__________________
Free Rides on Uber and Lyft
Uber Car: uberTzTerri
Lyft Car: TZ896289
Cleo is offline   Reply With Quote
Old 2010-03-29, 08:00 PM   #3
Cleo
Subversive filth of the hedonistic decadent West
 
Cleo's Avatar
 
Join Date: Mar 2003
Location: Southeast Florida
Posts: 27,936
Here is the complete list.

Apple today posted Mac OS X 10.6.3, along with a corresponding Server 10.6.3 update, plus a Security Update 2010-002 for Leopard (10.5.8) and a Server Security 2010-002 update for Server 10.5.8. (There's no security update for Mac OS X 10.4 "Tiger", which appears to no longer be supported.) The updates address a long list of security flaws and other bugs, including the following:

improve the reliability and compatibility of QuickTime X
address compatibility issues with OpenGL-based applications
address an issue that causes background message colors to display incorrectly in Mail
resolve an issue that prevented files with the # or & characters in their names from opening in Rosetta applications
resolve an issue that prevented files from copying to Windows file servers
improve performance of Logic Pro 9 and Main Stage 2 when running in 64-bit mode
improve sleep and wake reliability when using Bonjour wake on demand
address a color issue in iMovie with HD content
improve printing reliability
resolve issues with recurring events in iCal when connected to an Exchange server
improve the reliability of 3rd party USB input devices
fix glowing, stuck, or dark pixels when viewing video from the iMac (Late 2009) built-in iSight camera
AppKit: Spell checking a maliciously crafted document may lead to an unexpected application termination or arbitrary code execution
Application Firewall: Certain rules in the Application Firewall may become inactive after restart
AFP Server: When guest access is disabled, a remote user may be able to mount AFP shares as a guest. A remote user with guest access to an AFP share may access the contents of world-readable files outside the Public share
Apache: A remote attacker may be able to bypass access control restrictions
ClamAV: ClamAV virus definitions may not receive updates
CoreAudio and CoreMedia: Playing maliciously crafted audio content or movie file may lead to an unexpected application termination or arbitrary code execution
CoreTypes: Users are not warned before opening certain potentially unsafe content types
CUPS: A local user may be able to obtain system privileges
curl: A man-in-the-middle attacker may be able to impersonate a trusted server
curl: Using curl with -L may allow a remote attacker to read or write local files
Cyrus: A local user may be able to obtain the privileges of the Cyrus user. An unauthenticated remote attacker may cause unexpected application termination or arbitrary code execution
DesktopServices: Items copied in the Finder may be assigned an unexpected file owner. A remote attacker may gain access to user data via a multi- stage attack
Disk Images: Mounting a maliciously crafted disk image may lead to an unexpected application termination or arbitrary code execution
Directory Services: A local user may obtain system privileges
Dovecot: An authenticated user may be able to send and receive mail even if the user is not on the SACL of users who are permitted to do so
Event Monitor: A remote attacker may cause arbitrary systems to be added to the firewall blacklist
FreeRADIUS: A remote attacker may obtain access to a network via RADIUS authentication
FTP Server: Users may be able to retrieve files outside the FTP root directory
iChat Server: A remote attacker may be able to cause a denial of service. Chat messages may not be logged. An authenticated user may be able to cause an unexpected application termination or arbitrary code execution
ImageIO: Viewing a maliciously crafted JP2 or TIFF image may lead to an unexpected application termination or arbitrary code execution. Visiting a maliciously crafted website may result in sending data from Safari's memory to the website
Image RAW: Viewing a maliciously crafted NEF or PEF image may lead to an unexpected application termination or arbitrary code execution.
Libsystem: Applications that convert untrusted data between binary floating point and text may be vulnerable to an unexpected application termination or arbitrary code execution
Mail: Rules associated with a deleted mail account remain in effect. Mail may use a weaker encryption key for outgoing email
Mailman: Multiple vulnerabilities in Mailman 2.1.9
MySQL: Multiple vulnerabilities in MySQL 5.0.82
OS Services: A local user may be able to obtain elevated privileges
Password Server: A remote attacker may be able to log in with an outdated password
perl: A local user may cause arbitrary files to be deleted
PHP: Multiple vulnerabilities in PHP 5.3.0. Multiple vulnerabilities in PHP 5.2.11
Podcast Producer: An unauthorized user may be able to access a Podcast Composer workflow
Preferences: A network user may be able to bypass system login restrictions
PS Normalizer: Viewing a maliciously crafted PostScript file may lead to an unexpected application termination or arbitrary code execution
QuickTime: Viewing a maliciously crafted movie or MPEG file may lead to an unexpected application termination or arbitrary code execution.
Ruby: Multiple issues in Ruby on Rails. Running a Ruby script that uses untrusted input to initialize a BigDecimal object may lead to an unexpected application termination.
Server Admin: A remote attacker may extract information from Open Directory. A former administrator may have unauthorized access to screen sharing.
SMB: A remote attacker may be able to cause a denial of service
Tomcat: Multiple vulnerabilities in Tomcat 6.0.18
unzip: Extracting maliciously crafted zip files using the unzip command tool may lead to an unexpected application termination or code execution
vim: Multiple vulnerabilities in vim 7.0
Wiki Server: Uploading a maliciously crafted applet may lead to the disclosure of sensitive information. An authenticated user may bypass weblog creation restrictions.
X11: Viewing a maliciously crafted image may lead to the disclosure of sensitive information. Displaying maliciously crafted data within an xterm terminal may lead to arbitrary code execution.
xar: A modified package may appear as validly signed
__________________
Free Rides on Uber and Lyft
Uber Car: uberTzTerri
Lyft Car: TZ896289
Cleo is offline   Reply With Quote
Old 2010-03-29, 09:00 PM   #4
terry
You can now put whatever you want in this space :)
 
terry's Avatar
 
Join Date: Apr 2004
Location: Montreal
Posts: 5,883
Send a message via ICQ to terry
Holy Crap!
terry is offline   Reply With Quote
Old 2010-03-29, 10:19 PM   #5
cd34
a.k.a. Sparky
 
cd34's Avatar
 
Join Date: Sep 2004
Location: West Palm Beach, FL, USA
Posts: 2,396
The thing I find disappointing about security issues is the 'count' of exploits fixed. This is also done with Linux. Linux as a core is very secure, it is the applications running on it that are usually the problem. Just glancing at the list:

Apache, ClamAV, CUPS, curl, cyrus, Dovecot, FreeRadius, MySQL, Perl, PHP, Ruby, unzip, xar

are not software packages produced by Apple, yet, are included in the vulnerability count. They are packaged and redistributed through Apple's package manager but are they truly Apple vulnerabilities?

How many Windows development boxes not running the new MySQL are currently vulnerable? Is Microsoft going to push updates to perl, MySQL, php to machines that have it installed? Will Microsoft count vulnerabilities in those applications along with their own vulnerabilities?

Some Linux distributions have packaged over 12000 pieces of software. Vulnerabilities discovered in packages that people don't even use are counted as Linux security issues.

Oh well....
__________________
SnapReplay.com a different way to share photos - iPhone & Android
cd34 is offline   Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -4. The time now is 08:04 PM.


Mark Read
Powered by vBulletin® Version 3.8.1
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© Greenguy Marketing Inc