Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Businesses OS X Operating Systems Apple

Apple Release Mega Patch to Fix 19 Flaws 554

maotx writes "Apple has released a mega-patch that fixes 19 flaws in Mac OS X v10.3.9. The updates include several fixes for remote and local root exploits. The change log can be found here. You can download the updates using the Software Update Program or directly from Apple Downloads."
This discussion has been archived. No new comments can be posted.

Apple Release Mega Patch to Fix 19 Flaws

Comments Filter:
  • silly taco (Score:5, Informative)

    by Anonymous Coward on Thursday May 05, 2005 @03:55PM (#12444835)
    it was a 6 mb security release from 2 days ago.
  • Re:10.3.10? (Score:5, Informative)

    by LEgregius ( 550408 ) on Thursday May 05, 2005 @03:58PM (#12444870)
    Apple has always separated security updates from OS updates. I guess it's just a matter habit.
  • by Enrique1218 ( 603187 ) on Thursday May 05, 2005 @04:01PM (#12444904) Journal
    Once a month. This was a one alot bigger than average.
  • Re:10.3.10? (Score:5, Informative)

    by remahl ( 698283 ) on Thursday May 05, 2005 @04:01PM (#12444910)
    No, there is very solid reasoning behind doing so.

    A security update should have a very low threshold for installation. An admin should be able to apply it feeling somewhat confident it is not going to break anything important. Of course, on critical systems "somewhat" is not enough so it may still require some testing.

    Point being, a security update should be lightweight to encourage quick adoption.

    As an aside, Apple "violated" this express policy and included a few security updates with 10.3.9. That update turned out to break things for a lot of people, therefore people held off installing it. During that time, they were subjected to published vulnerabilities.
  • by Anonymous Coward on Thursday May 05, 2005 @04:02PM (#12444916)
    They release patches when they need to. Easy peasy. :D

    The interface is simple. I have it set to automatically let me know when there are updates available, but you can optionally pick "Software Update" from the Apple menu to see if there's anything new. Or, if you prefer (why, though?) you can download updates from the and install them yourself.

    Little patches are rare, but not unheard of. Usually to fix emergency security bits.
  • by Anonymous Coward on Thursday May 05, 2005 @04:03PM (#12444921)
    Do they have some sort of web-interface like Windows-update, or is it a self-contained program, or is it an open thing that you can use whatever browser/program you'd like to download?

    From the summary, You can download the updates using the Software Update Program or directly from Apple Downloads."

  • Software Update is a system tool. It can be set to check for updates daily, weekly, or monthly (IIRC).

    They do a mix of patches depending on what's needed. If there's just a small hotfix, that's what's there. If there's several unrelated fixes, they're all there. Other times it's big fixes like this. Also note that every few months they'll roll up a bunch of fixes into one big one to make it easier on people.
  • Re:While I think... (Score:5, Informative)

    by remahl ( 698283 ) on Thursday May 05, 2005 @04:05PM (#12444958)
    They could do a better job, I think. The product security team must be overworked. I was credited with discovery of four of the issues (more about those [remahl.se]), and I reported them in mid-February. Almost three months later, the patch is out...
  • Re:10.3.10? (Score:2, Informative)

    by Experiment 626 ( 698257 ) on Thursday May 05, 2005 @04:05PM (#12444968)

    Would someone please explain to me why this comment would be marked as "Flamebait"? Still trying to get a handle on this mod thing.

    I'm guessing it was some mod who doesn't get the concept that the segments in 10.3.9 are separate fields (like an IP address) rather than one big floating point decimal, thinks "10.310 < 10.39, OMG, this poster wants to make OS X go backwards!" and clicked the flamebait button.

  • by tomcio.s ( 455520 ) on Thursday May 05, 2005 @04:08PM (#12445004) Homepage Journal
    How often does Apple release patches and the like? I'm just curious to see how it compares to say Windows.
    -About once every 2 months we see security patch. They now name them 200x.00y (x - year, y - patch this year).
    -Software updates for apple software (non-OS related) come in about the same frequency. I usually get bugged to install something once every 2 weeks or so.
    -Software updates for apple OS (10.3.x, where x is the current update) come in about once a quarter, or so.

    All of those are voulentary upgrades.

    Do they have some sort of web-interface like Windows-update, or is it a self-contained program, or is it an open thing that you can use whatever browser/program you'd like to download?

    -There is an automated, stand alone tool to deliver them.
    -They get posted as downloads to their site (apple.com) with documentation, description, etc.
    -Sometimes, multiple patches get rolled into an 'uber' patch, if you are installing (upgrading) from previous release of the os to current (not on the release day). Apple also re-issues their OS media w/ most patches as they get posted.

    So you can use any number of ways to patch your system.

    Are there lots of little patches all the time, or just big lumps of patches like this one?

    See above. Small patches are released if they are important, as time progresses they get rolled into bigger, all inclusive patches (and still available as the small ones).

    Note, Apple also uses this mechanism to install firmware for iPods, iSights and Airport Stations - which makes upgrading your kit really convinient.

    You can set the stand alone utility to check daily/weekly, whatever, or disable it as well.
  • Re:Apache Exploit (Score:5, Informative)

    by CausticPuppy ( 82139 ) on Thursday May 05, 2005 @04:10PM (#12445024)
    Does the Apache exploit mentioned affect any other platforms that Apache runs on, or is it specific to OSX? Its a pretty severe one. I don't run closed source OSes (like OSX or Windows) but I would like to make sure that my Gentoo apache install is OK.

    I believe it's referring to this bug [debian.org] in htdigest that was reported a year ago. If so, it affects linux systems as well.

    I wouldn't worry too much about it, it's not a remotely exploitable overflow... it could be exploited by somebody who was allowed to upload a malicious CGI script to your server, but it would have to be somebody who was allowed to deploy CGI scripts to your apache server to begin with.

  • Re:Several exploits (Score:2, Informative)

    by m50d ( 797211 ) on Thursday May 05, 2005 @04:18PM (#12445134) Homepage Journal
    Absolutely, but I thought the whole point of a *nix foundation was proper separation of root and non-root, there shouldn't be any remote roots. Looking at the list again I can't see any remote root - if apache's running as root there are bigger problems than these vulnerabilities, I don't see why root would be opening an image or help page, and the other vulnerabilities don't seem to be remote. Anyone care to set me straight on this?
  • by line.at.infinity ( 707997 ) on Thursday May 05, 2005 @04:19PM (#12445143) Homepage Journal
    Apple has also released Bonjour for Windows [apple.com] (05/05/05). Bonjour, formally known as Rendezvous, also known as zero-configuration networking.
  • Re:Several exploits (Score:5, Informative)

    by remahl ( 698283 ) on Thursday May 05, 2005 @04:23PM (#12445191)
    the time from discovery to fix was relativly short.

    Oh [secunia.com] (three months) really [secunia.com] (5 months)?

  • by amichalo ( 132545 ) on Thursday May 05, 2005 @04:26PM (#12445219)
    maybe this [apple.com] could help. Also this [apple.com] may hold some clues. Both feature keyword searching.
  • by daveschroeder ( 516195 ) * on Thursday May 05, 2005 @04:30PM (#12445268)
    I don't care how many remote root vulnerabilities there are if the services that have said vulnerabilities are never even enabled. There have been numerous theoretical remote root exploits in service that ship with OS X. But the services that are affected are, quite literally, almost NEVER ENABLED for the lifetime of the machines in question. So, point 1, that "every Mac in existence" is affected, is completely wrong. To say nothing of the fact that statistically speaking, the vanishingly small relative minority of machines that DO have the service enabled are probably behind a personal firewall/router. In other words, the level of exposure and potential for remote exploitation of the VAST majority of Mac OS X machines is somewhere between zero and nil.

    And your other general point about "popularity" is answered below. Nice troll, though.

    On this subject, last year I answered a query raised during a Chronicle of Higher Education colloquy. I believe it touches on the major issues here.

    Question from Lisa L. Spangenberg, UCLA:
    Given that there are no viruses or Trojan horses for the current Macintosh system, OS X 10.3, and given that it is essentially UNIX, and given that the most common applications (Microsoft Office Suite, Adobe applications) work very well on OS X, why don't more institutions adopt Macs and encourage faculty to use them?

    Gregory A. Jackson:
    Well, first of all, there are viruses and Trojans that afflict MacOS, witness Apple's periodic release of security fixes to counteract them.


    First, that isn't true, regarding viruses. To date, there are no known viruses that specifically target Mac OS X. Last week's "trojan" was nothing more than an application with a different icon and misleading name that displayed a dialog box (which was an example posted to a USENET Mac programming group to illustrate this fact that has been known and possible on Mac OS for over twenty years; an antivirus vendor apparently thought this an appropriate time to dress it up, incorrectly, as some new, terrible exploit easily adapted for malicious means, when in reality it's nothing more than an application).

    If you're referring more broadly to security issues in general, almost all of the security and security-related updates for Mac OS X to date have been updates for primarily server-type services that ship with the OS, all of which are disabled by default, and the lion's share of which are never even enabled, much less touched, on the vast majority of systems. I'm not saying that they should be ignored, but Apple's comprehensive and swift response to the most minor security issues does not rise to the level of the staggeringly numerous, sometimes completely automated, remote exploits, worms, and so on for Windows. It is no longer possible to even get through a full installation Windows XP on a machine connected to a public network without it being exploited before you even have a chance to patch it.

    It's definitely possible for Mac OS X to have viruses, worms, trojans, and other malware - Mac OS X is not invulnerable, and no sensible person would claim it to be. But the underlying philosophical design principles are fundamentally more secure than Windows, period. Since the major ingredient for the success of a worm or virus is some ability to spread, witness the fact that there is no way with anything built into Mac OS X to perform automated propagation of a virus, and no current known ways to exploit a machine remotely, not to mention that potentially exploitable network services are disabled to begin with anyway (and remain that way unless explicitly enabled), a stark contrast to Windows. Any hope for automatic propagation would require a comparatively high level of sophistication, and perhaps even its own mail server - not to mention some intrinsic vulnerability to exploit. On the other hand, there are still, to this moment, unfixed vulnerabilities in certain versions of Outlook that will spread certain virus variants simply by previewing a

  • by pizero ( 461424 ) on Thursday May 05, 2005 @04:31PM (#12445276)
    Post it at the Apple Support Discussion Site [apple.com] (for 10.3.x).

    Apple techs lurk there and some of the more knowledgeable support people who don't work for Apple as well.

    If no one there has a solution, they can tell you were the best place to complain is.
  • Re:Several exploits (Score:4, Informative)

    by rdc_uk ( 792215 ) on Thursday May 05, 2005 @04:31PM (#12445280)
    "OSX is really no different than Windows XP with Cygwin installed."

    lies.

    The basic filesystem hooks (the basic os filehandling) is FreeBSD, its a LOT more than a few BSD apps.

    OSX is _really_ a mach kernel, with a BSD derived OS on top, and a proprietary window manager on top of that.

  • An example: (Score:3, Informative)

    by David Rolfe ( 38 ) on Thursday May 05, 2005 @04:32PM (#12445292) Homepage Journal
    I should note that you can also run SoftwareUpdate from the command line (e.g., SoftwareUpdate --install --req to get everything critical, it approximates that warm fuzzy you get from running apt-get :).

    Here's an example of update type and frequency from my log. Note, I installed Panther on a fresh hard-drive on 4-20 there :-) So frequency of updates should be noted only after that date.

    Also note that this article isn't news (Thanks The Register) as most of us downloaded this 6 meg update days ago. I was all like "what another update?" but then "oh, Slashdot is just reporting the Olds for Nerds".
    2005-04-20 00:31:21 -0400: Installed "Mac OS X Update Combined" (10.3.9)
    2005-04-20 00:32:13 -0400: Installed "iPod Updater 2005-03-23" ((null))
    2005-04-20 00:37:39 -0400: Installed "Xcode Update" (1.1)
    2005-04-20 00:38:55 -0400: Installed "iTunes" (4.7.1)
    2005-04-20 00:41:14 -0400: Installed "iCal" (1.5.5)
    2005-04-20 00:43:20 -0400: Installed "iSync" (1.5)
    2005-04-20 02:11:05 -0400: Installed "iChat Update" (2.1)
    2005-04-20 02:11:26 -0400: Installed "iPhoto Update" (2.0.1)
    2005-04-20 16:22:48 -0400: Installed "QuickTime" (6.5.2)
    2005-04-20 16:23:13 -0400: Installed "Java 1.4.2 Update 2" (1.4.2 Update 2)
    2005-04-20 16:23:25 -0400: Installed "Security Update 2004-10-27" (1.0)
    2005-04-20 16:23:36 -0400: Installed "iSight Update" (1.0.3)
    2005-04-20 16:23:50 -0400: Installed "Security Update 2005-004" (1.0)
    2005-04-20 16:44:17 -0400: Installed "AirPort Software" (4.1)
    2005-04-20 16:44:30 -0400: Installed "Security Update 2005-002" (2.0.0)
    2005-04-22 17:46:39 -0400: Installed "Java Update for Mac OS X v10.3.9" (1.0)
    2005-04-29 17:52:16 -0400: Installed "QuickTime" (7.0)
    2005-04-30 17:32:04 -0400: Installed "QuickTime SDK" (7.0)
    2005-05-02 18:24:46 -0400: Installed "Remote Desktop Client Update" (2.2)
    2005-05-03 17:28:39 -0400: Installed "Security Update 2005-005" (1.0)
    Anyway -- to everyone who is 'happy' about this being posted on Slashdot, because you didn't know about it yet: Please, please just set Software Update to check everyday and fetch updates in the background. Then it's like Christmas when it bounces in the dock and says "Yay, I have updates ready to go if you'd like to install them!"

    (This should be familiar to all those 2K and XP folks who have the Windows Auto Update thingamajig).
  • Re:While I think... (Score:2, Informative)

    by Mancat ( 831487 ) on Thursday May 05, 2005 @04:43PM (#12445406) Homepage
    Usually it's enough to take the KB ID from the patch and reference it back to the KB.
  • Re:Several exploits (Score:5, Informative)

    by Golias ( 176380 ) on Thursday May 05, 2005 @04:44PM (#12445413)
    Clue #1: Macs have the root user disabled by default. Most users who know enough about UNIX to need to enable the root user are probably wise enough to secure their networks.

    Clue #2: If marketshare was the only factor, there would be far more exploits and virii floating around for Apache than for IIS. Security design matters more than market share, and Macs are vastly more secure than Windows boxen.

    Clue #3: There's not clue 3.

    Clue #4: Incorrect plurala can be fun.
  • Re:10.4.1 (Score:3, Informative)

    by Anonymous Coward on Thursday May 05, 2005 @05:01PM (#12445633)
    Ok, enough is enough.

    Put the keyboard down. Now, I want you to read this and repeat these words after me:

    I do not work for Apple. Again. I do not work for Apple.

    Do you feel better? One more time:

    I do not work for Apple. If I worked for Apple, I'd have been fired by now. If I worked for Apple, people who really are from Apple would know who I am. I could not possibly post at this volume and depth and work at Apple without someone knowing exactly who I am.

    It's hard to come to terms with. But it's reality. Yes, you're an obnoxious loon, and in that respect, perhaps you're perfectly qualified to work in management there. But you are not, repeat, not working for Apple. You need to quit with the "we" stuff. With the tall tales.

    People have gone mad pretending to be mad. Your mental health is at serious risk.

  • Re:Several exploits (Score:2, Informative)

    by oldwolf13 ( 321189 ) on Thursday May 05, 2005 @05:12PM (#12445725) Journal
    There WERE macintosh ads that proclaimed it to be unix when it first came out. I remember even seeing a billboard which said it was unix.

    On a side note... anyone else sick of this guy proclaiming to speak for apple yet seeming to have no credentials?

    Is this an Apple PR account? Somehow I doubt it... as I said before.. probably a nobody at apple who has the parts to try and speak for them.
  • Re:Several exploits (Score:2, Informative)

    by As Seen On TV ( 857673 ) <asseen@gmail.com> on Thursday May 05, 2005 @05:13PM (#12445740)
    Sorry, that doesn't work for real servers

    A real server wouldn't be running Mac OS X. It's would be running Mac OS X Server, an entirely different product unrelated to what we're discussing here.
  • No IMAPS Fix? (Score:4, Informative)

    by tyagiUK ( 625047 ) on Thursday May 05, 2005 @05:18PM (#12445786) Homepage
    Since Apple broke IMAPS support in the 10.3.9 release, it would have been nice to see a fix in this patch.

    Basically, the problem is that if you use Mail.app to access a remote IMAPS server, you may experience problems synchronising your mailbox. My symptoms are that the synchronisation starts but even though the subject lines appear in the list, the connection does not seem to download the message body and close down successfully. It can take several minutes/hours for it to complete, if at all.

    In the interim, I'm using Thunderbird on OS X, which is OK given that I use IMAP anyway, but it's far from ideal.

    Come on Apple, fix Mail.app!
  • by Moofie ( 22272 ) <lee@ringofsat u r n.com> on Thursday May 05, 2005 @05:32PM (#12445934) Homepage
    Access to the printer that's attached to my AirPort Express.
  • Re:Several exploits (Score:4, Informative)

    by As Seen On TV ( 857673 ) <asseen@gmail.com> on Thursday May 05, 2005 @05:50PM (#12446111)
    I don't really like that characterization.

    Imagine you've got a graduated cylinder, one that holds a cup of liquid. Fill it all the way up to the top. That's Linux's relationship with Unix. Linux is a file-by-file, folder-by-folder clone of Unix, all the way down to things that make no sense at all today like /proc and /dev.

    There's a little bit of stuff that's been added to Linux that wasn't present in Unix, but these are basically just replacements for the various X windowing environments. As a proportion, there's very little new technology there.

    On the Mac, on the other hand, there's only about a tablespoon of Unix in there. We've got the process model and some of the low-level APIs, sure. We've even got a terminal that offer Unix shells and command-line utilities. But we've stripped away massive parts of Unix --like init and the boot scripts, like cron, like /dev, like the various /etc files such as passwd and hosts --and replaced them with modern improvements, and then we've added tons of new stuff. Whole new runtime environments, like Objective-C. Core Foundation. The whole of Cocoa. IOKit. Core Graphics and QuickTime, lookupd and Open Directory. And so forth and so on.

    So that's why I say that Mac OS X evolved from Unix.

    Why do you think we call our implementation of Unix "Darwin?"
  • Re:10.3.10? (Score:2, Informative)

    by slapout ( 93640 ) on Thursday May 05, 2005 @06:07PM (#12446257)
    Because of the internal representation (0x1039), I don't think the last digit can be higher than nine. I'm sure a Mac programmer can correct me.

    http://cocoadevcentral.com/articles/000067.php [cocoadevcentral.com]

    http://blogs.msdn.com/oldnewthing/archive/2004/02/ 13/72476.aspx#72670 [msdn.com]
  • by cheesy9999 ( 750203 ) on Thursday May 05, 2005 @06:13PM (#12446304)
    I don't remember the exact words, but during the WWDC 2004 keynote Steve Jobs himself said Mac OS X was the worlds biggest UNIX distribution.

    http://live.macobserver.com/article/2004/06/wwdc20 04_keynote.shtml [macobserver.com]
  • Re:Can you imagine (Score:4, Informative)

    by DebianDog ( 472284 ) <dan.danslagle@com> on Thursday May 05, 2005 @06:51PM (#12446641) Homepage
    Umm this is for the last version there, spanky ;-) It would be like M$ releasing a patch for XP the week after (Windows 2007/Win XPv2/Win Super Extreme) is launched.
  • Re:Several exploits (Score:5, Informative)

    by misleb ( 129952 ) on Thursday May 05, 2005 @06:58PM (#12446698)
    Clue #1: Macs have the root user disabled by default. Most users who know enough about UNIX to need to enable the root user are probably wise enough to secure their networks.

    Clue #1.1: Root user *login* is disabled by default. The root user and processes running as root are always there.

    -matthew

  • by Anonymous Coward on Thursday May 05, 2005 @08:21PM (#12447311)
    Could someone explain the "so what" to this? I know itunes uses rendesvous for library sharing, and ichat has a rendesvous system for chat, but what does a windows user get out of this?

    I think this release is basically to encourage other developers to use it. The fact that it was released with no fanfare would support that theory. Apple has a vested interest in seeing ZeroConf (the open standard that Bonjour implements) surpass the considerably less open UPnP system that Microsoft uses. So the answer to your question is "Not much, yet."

    Your iTunes/iChat examples are a bit misleading -- ZeroConf just handles the discovery aspect (shared libraries just "appear" without entering IPs or searching the network) -- the actual communication is handled by each app itself. It isn't something you have to rewrite apps for -- it can be added to appropriate apps in a few hours.
  • Re:Several exploits (Score:5, Informative)

    by skahshah ( 603640 ) on Thursday May 05, 2005 @10:15PM (#12447974)

    The NSA posted an OS X security guide. The NSA stated that OS X is the most secure of clients OSes, particularly in its default configuration.

    http://www.nsa.gov/snac/os/applemac/osx_client_fin al_v.1.pdf [nsa.gov]

  • Re:Several exploits (Score:3, Informative)

    by drsmithy ( 35869 ) <drsmithy&gmail,com> on Thursday May 05, 2005 @10:50PM (#12448143)
    It's would be running Mac OS X Server, an entirely different product unrelated to what we're discussing here.

    OS X Server is about as different from OS X "Client" as Windows XP is from Windows 2003 Server.

    Which is to say, not a great deal.

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...