Apple Forcing Panther Upgrade for Security Patch 605
The Raindog writes "I noticed over at Tech Report that Apple is apparently only offering its latest round of OS X security fixes to Panther users, leaving older versions of OS X out in the cold. " Update: 10/31 by J : But see
the next day's story.
Bugtraq links (Score:5, Informative)
Arbitrary File Overwrite via Core Files [securityfocus.com]
Systemic Insecure File Permissions [securityfocus.com]
Long argv[] buffer overflow [securityfocus.com]
If it is going to be Apple's policy to not provide support [apple.com] for previous operating systems from the day the new one comes out it is going to be very, very difficult for them to break into the enterprise world. Even Microsoft provides support for operating systems for a few years after the new one is released. Maybe if enough people submit a bug report [apple.com] Apple will do something about it.
Not True... (Score:4, Informative)
Re:Bugtraq links (Score:5, Informative)
Re:As a long time Mac user, I'm not surprised. (Score:5, Informative)
Re:Damn! (Score:3, Informative)
There you go.
Re:Maybe it only applies to Panther. (Score:1, Informative)
Security Update 2003-10-28 addresses a potential vulnerability in the implementation of QuickTime Java in Mac OS X v10.3 and Mac OS X Server v10.3 that could allow unauthorized access to a system.
Java got a version boost in Panther, so it's not unthinkable that a little error slipped in this version; and doesn't affect the pre-Panther systems in any way.
Re:Not True... (Score:5, Informative)
Re:As a long time Mac user, I'm not surprised. (Score:2, Informative)
FUD (Score:1, Informative)
Are these anything to worry about? (Score:3, Informative)
This just in from Apple: (Score:3, Informative)
So it seems that only Panther is vulnerable, and there is no need to release a patch for 10.2.x and 10.1.x.
Re:As a long time Mac user, I'm not surprised. (Score:2, Informative)
quick, what was the version of system software immediately before the release of 7.0?
6.0.7. System 7 was released after 6.0.7 and 6.0.8 was released AFTER System 7. When MacOS X came out, how many updates were there to 9.x?
This does not effect 10.2.x (Score:4, Informative)
>The issue does not exist in earlier versions of Mac OS X or Mac OS X Server.
Sensationalist bullshit. (Score:2, Informative)
Give it a day or two. Apple has not said that they won't be issuing the patch for Jaguar, they merely haven't released it yet. In all likelyhood, a Jaguar patch will follow.
If memory serves, they continued to issue security patches for 10.1 after Jaguar was released. I see no reason why they'd choose to alienate their customers by not doing the same for Jaguar now that Panther's out in the wild.
Journalistic integrity on Slashdot? Yeah, I'm asking a bit much.
Re:*swirls in MS logo* (Score:1, Informative)
Re:Bugtraq links (Score:4, Informative)
Hmm. The only one that looks like it might be a problem to normal desktop users is the argv[] overflow. And that doesn't seem like much of a problem to me, since it's highly unlikely they'll hit it.
The other two are easily fixable by users. In fact, by default they're already configured to not be an issue.
Systemic Insecure File Permissions in particular is such a yawner as to not even be worth mentioning.
Re:FUD (Score:2, Informative)
http://docs.info.apple.com/article.html?artnum=
QuickTime 6.4 for Jaguar (10.2) doesn't include QuickTime Java support.
I will make the leap that a) a fix is effectively in place for Jaguar (no support for vulnerable software) and b) the issue doesn't exist in versions of QuickTime's Java support prior to 6.4.
If all of the above is true, this is simply a big, fat FUD piece.
--fp
Re:10.3 Only Problem (Score:4, Informative)
You're a moron.
The 10.3-only security issue Apple just patched has nothing whatsoever to do with what we're talking about, which is three security issues identified by @Stake that do not exist in 10.3. Sure, the summary is stupid, but that's because the article is stupid. They're saying Apple is only making the fixes available in 10.3; the truth is, the problems don't exist in 10.3 and Apple hasn't released a patch for 10.2 yet because @Stake only announced them two days ago.
Re:As a long time Mac user, I'm not surprised. (Score:2, Informative)
Here's the real story (Score:5, Informative)
You need to RTFA (Score:5, Informative)
Apple declined comment.
Sure, they should have pronounced their intent to fix the problems but they have certainly NOT stated that the intent is to leave 10.2.x unpatched.
The article is a bit misleading, as well. For instance, it fails to note that the @stake advisory in question (core files can be used to overwrite arbitrary files) pertains to a facility that is disabled in all Apple-supplied 10.2 installations.
In short, they should fix it. Soon. They haven't said they won't, though, and it's been *almost* two days. I'm taking a "wait and see" approach on this one.
Re:This does not effect 10.2.x (Score:1, Informative)
Both of these are listed as affecting 10.2 and below, according to @Stake. Also, supposedly someone at Apple did tell someone at @Stake that they were not going to fix the bugs for 10.2.8. Let's hope they change their minds because $129 is a lot to pay for a security patch.
www.atstake.com/research/advisories/2003/a10280
www.atstake.com/research/advisories/2003/a1
Apple is Fine (even if Linux is Better :-)) (Score:0, Informative)
Such a statement, aparently confirmed by Apple, will keep Mac OS X out of any server applications.
Such as statement was obviously taken out of context, carefully edited for maximum anti-Mac (and by implication pro-Microsoft) effect. As others have pointed out, the security flaw is only applicable to OS X 10.3. 10.1 and 10.2 are not vulnerable, so no patch is required.
Let me repeat. OS X 10.1 and 10.2 are not vulnerable, so no patch is required. Saying "Apple isn't going to release patches for 10.2" without pointing out the fact is dishonest, yellow journalism on steroids, and more indicative of a marketing FUD campaign than any serious technical reporting.
Indeed, the spin and dishonesty in the article is so severe, and the pro-Micorosoft bias in the (mis)reporting of the facts so obvious, that I'm surprised even Intel zealots would buy it outright, hook-line-and-sinker, without even a thought to the contrary. The allegation itself should be setting even the most ardent Microsoft zealot's bullshit alarm off.
And I say this as one who does most if his work on an Intel box, ableit running GNU/Linux (though I do enjoy my Apple Powerbook and OS X as well).
Debunked (Score:3, Informative)
Re:Bugtraq links (Score:2, Informative)
You bought an ipod without an on the fly playlist feature and were never told you would ever have one. How is that a load of crap? They should develop software upgrades for older models they no longer sell???
Not true... (Score:3, Informative)
I honestly don't think that this will remain a problem, Apple has been pretty good about patching things as they come along, but the point of the article is that 10.2 IS vulnerable, with the only protection/patch being an upgrade to Panther.
Re:Apple is Fine (even if Linux is Better :-)) (Score:3, Informative)
Nonsense. If you actually look up bugtraq reports by @stake, you will see all OS X versions 10.2.8 and below are vulnerable. Here [securityfocus.com], here [securityfocus.com] and here [securityfocus.com].
MOD PARENT DOWN (Score:3, Informative)
Does ANYONE read the articles? Apple recently released a security patch for a completely unrelated security issue in 10.3 that does not apply to 10.2, and everyone assumes that's what this is about, even though this article is about three COMPLETELY DIFFERENT security issues that @Stake found in 10.2 that do NOT exist in 10.3 that Apple HAS NOT YET released patches for.
Re:Apple is Fine (even if Linux is Better :-)) (Score:3, Informative)
I hate to sound rude but that is just pure BS. A shame to slashdot that you could achieve a +5 for that cr*p. Instead of your generalized disinformation here are the facts: Take a look at CAN-2003-0877 [securityfocus.com]. To quote:
Now if the vulnerability only existed in 10.3, how come you are supposed to update to 10.3 in order to fix it?
Now take a look at the Apple Security Updates [apple.com] page. Is the fix for CAN-2003-0877 listed under 10.2.8? No. It's only under 10.3.
Take a look at this comment [slashdot.org] for more links to vulnerabilities that exist under 10.2 but are only fixed for 10.3.
To all the mods who modded the parent up: Shame on you! It contains not one link to any evidence. A statement like "As others have pointed out..." without any further specification is a generalization and stinks of disinformation.