Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
OS X Businesses Operating Systems Security Apple

Apple Mac OS X Update For 17 Vulnerabilities 259

BSDetector writes "Apple has released fixes for 17 OSX vulnerabilities, ranging from system takeover to denial-of-service attacks. It was the fifth security update released this year. It also marked the first time this year that an operating system security update from Apple did not patch a vulnerability disclosed by the January Month of Apple Bugs project. Today's update pushed Apple's year-to-date patch total to over 100. More than one of the affected flaws were called 'critical' or 'dangerous'."
This discussion has been archived. No new comments can be posted.

Apple Mac OS X Update For 17 Vulnerabilities

Comments Filter:
  • Re:I feel robbed (Score:4, Informative)

    by vslashg ( 209560 ) on Saturday May 26, 2007 @09:46PM (#19287625)

    What's so special about Apple? Why can't I be notified by Slashdot when Microsoft releases patches?

    Yeah, Slashdot never makes post like this about Microsoft. Certainly this article from two weeks ago [slashdot.org] has nothing to do with notable Windows security patches.

  • by Secret Rabbit ( 914973 ) on Saturday May 26, 2007 @09:48PM (#19287649) Journal
    ... it's also about /how/ they are handled. Some might say more-so.

    From what I've seen, Apple has been quite responsible with fixing found vulnerabilities: turn around times, etc. More-so than that other guy. So, I can't really complain.
  • by dustin_c1 ( 153078 ) on Saturday May 26, 2007 @09:57PM (#19287719)
    "From what I've seen, Apple has been quite responsible with fixing found vulnerabilities: turn around times, etc. More-so than that other guy. So, I can't really complain."

    Apple's time to patch was about twice as long as Microsoft's in 2006. From the looks of things, they may be working hard on improving that.

    Apple has historically been terribly irresponsible with found vulnerabilities. This article says this is the first exploit fixed that hasn't been logged on the MOAB project.

    Read up the MOAB. The MOAB project was started by security researchers who decided to release their findings publicly (and not contact Apple beforehand giving them time to fix the vulnerability before it becomes publicly known) because they got mad when Apple outright denied some existing vulnerabilities they found.

    You are incorrect. Apple has a terrible track record when it comes to handling vulnerabilities when compared to the other guy. It looks like they are making progress.
  • open the gates (Score:2, Informative)

    by v1 ( 525388 ) on Saturday May 26, 2007 @10:22PM (#19287925) Homepage Journal
    we shall now see the flood of the clueless that run around in circles screaming OMG SEE MACS HAVE BAD SECURITY TOO. To stamp out their fire before it gets beyond the first match I'd like to point out that even if they fixed 1000 things in this update, you can't compare apples (sorry) to oranges. The lion's share of vulns patched in say, Windows, I would classify "big trouble". Exploits that are in the wild (some of which have been running loose for months) that let remote attackers own your box. Even with that we see the antivirus companies coming out with many new patterns every week. Most are for viruses and spyware, but some are for remote code execution, which is arguably the worst thing you can have happen to your computer.

    The number of patched remote code execution bugs that have been found and fixed on the mac recently are countable on one hand. Most (all?) of them are LAN originatable only. And it's not that Apple's not plugging existing holes... there weren't many to fix to begin with. The rest of the fixes, as pointed out by an earlier poster, are for things where someone emails you an attachment and you run it. Sorry but if you are assisting the viruses you really shouldn't hold the computer accountable anyway, but Apple still does its best to bulletproof you even in your stupidity. Their main concern there I believe is that you could send the evil attachment to an unprivileged user and that could lead to elevated privileges for that user or to execute code beyond that user's privs.

    Any OS that has so many holes to fix that it can justify a weekly scheduled security fix is clearly in a class by itself.
  • by Anonymous Coward on Saturday May 26, 2007 @10:35PM (#19288025)
    MOAB was founded by security researchers who wanted publicity. Among other issues was a bug in OmniWeb, which was never reported to The Omni Group. How would being frustrated at Apple possibly justify that one?
  • by edwardpickman ( 965122 ) on Saturday May 26, 2007 @11:05PM (#19288271)
    Windows virus making you irritable? It's okay Mac users understand, it's why we're on Mac. Just take two virus checkers and make sure your firewall is set. Don't install any non Microsoft approved software and stick with Office software until your machine is feeling better. If you need to get some work done just borrow a friends Mac. When I got my first Mac a year ago I looked for a copy of anti spyware for the Mac. A friend pointed out it's like giving a nun birth control. Macs aren't a 100% secure they just seem that way to the users.
  • Any of the above (Score:5, Informative)

    by SuperKendall ( 25149 ) on Saturday May 26, 2007 @11:14PM (#19288347)
    All of the ones you listed involve manipulating code on my computer in ways it was not meant to be run, so sure.

    There have been no exploits in any of those categories in the wild. Heck, some of the proof of concept exploits don't even generally work (like the Quicktime exploit, that required I RUN AN EXPLOIT GENERATOR locally and run the generated QT file - still didn't work on any of my Macs!)
  • Re:Not a big deal (Score:5, Informative)

    by EMB Numbers ( 934125 ) on Saturday May 26, 2007 @11:16PM (#19288367)
    What is it about developing software for Mac OS X that you dislike compared to Linux ?

    Are you using Cocoa, Carbon, Java, BSD/POSIX APIs, X Server ?

    Are you using X-Code, eclipse, something else ?

    I routinely develop software for a variety of Unix systems, and I find Mac OS X just as comfortable and any other Unix. I can't think of many developer tools for Linux that is not also available for Mac OS X (Maybe the IBM/Rational Tools Suite ?). Some of the Mac OS X tools like Interface Builder, Shark, CHUD, and OpenGL Profiler are best of breed.
  • She must have hit the dialog without realizing it...by default, Apple Software Update won't auto-restart, and I don't think there's any way to even enable that behavior.

    By default, this is how it works:
    * ASU puts up dialog showing list of installable updates; they're checked by default. Ones with restart required are marked.
    * User unchecks items they don't want, presses "Install" or hits Return.
    * ASU downloads and installs software. At end, flashes its own icon in the Dock as notification.
    * User returns to ASU; if an update requiring restart has been installed, a modal dialog is displayed saying "The new software requires that you restart your computer..." with options "Shut Down" and "Restart." Default is 'Restart,' if user presses Return. (However, the dialog is modal only within the ASU application, you can still switch away from ASU and use the computer normally, and after clicking on it once, ASU no longer bounces in the Dock.)
    * If Restart is pressed, the computer will begin the reboot process. I *think* that the process will stop if you have an application open with an unsaved document, but I haven't tested this recently.

    Unfortunately, I think users are sometimes conditioned to quickly clicking the default option in any dialog they're presented with, that they sometimes don't realize until 1/4 sec after they hit it, that they just rebooted their computer.

    As an aside: it's possible to avoid the reboot either by just leaving ASU in the background indefinitely (pressing Cmd-H 'hides' it so that it doesn't clutter up the UI) or by Force Quitting it, although I doubt that's recommended.
  • by dr.badass ( 25287 ) on Sunday May 27, 2007 @12:02AM (#19288675) Homepage
    This article says this is the first exploit fixed that hasn't been logged on the MOAB project.

    You misunderstand. This is the first update that doesn't patch anything listed by MOAB. That doesn't mean that everything patched before was. MOAB only listed 31 bugs, whereas dozens of potential vulnerabilities have been patched by Apple in that time.

    The MOAB project was started by security researchers who decided to release their findings publicly because they got mad when Apple outright denied some existing vulnerabilities they found.

    That doesn't explain why they chose to give the same treatment to VLC [info-pull.com], OmniGroup [info-pull.com], and Panic [info-pull.com].
  • Re:Your confusion (Score:2, Informative)

    by Shadow-isoHunt ( 1014539 ) on Sunday May 27, 2007 @03:11AM (#19289763) Homepage
    No exploits, eh? Ever search on milw0rm.com [milw0rm.com]? Quite a few exploits there. Do you monitor any security lists at all? BugTraq?
  • by anticypher ( 48312 ) <anticypher@@@gmail...com> on Sunday May 27, 2007 @06:56AM (#19290791) Homepage
    a modal dialog

    Nope, the ASU dialog is non-modal, just like all other dialogs in OS-X. Modal means the user can do no more work on the computer until they respond. Non-Modal means the user can hide the dialog or application or switch focus and continue working. Dialogs can be modal to their application, but this is strongly discouraged as a design philosophy as well.

    Yes, I am a veteran of the Modal Wars. The war is mostly over and we non-modalists and computer users everywhere won. It was a major, well understood design decision from the original OS-X architects that nothing could ever be modal in OS-X. Users who switch away from using OS-X to a system that still permits modal dialogs often comment about how jarring it is to have a modal dialog they don't understand, and being forced to make an uninformed decision before being allowed to continue working or unable even to save their work. It is a subtle but very powerful distinction about who is in control of a session, the user or the OS. Modality is just a power trip for those who hate the idea that a person sitting in front of a machine might actually know what they are doing.

    the AC
  • by biftek ( 145375 ) on Sunday May 27, 2007 @08:54AM (#19291349)
    No, you're wrong. Bonjour (aka rendezvous aka mdns[responder]) listens on UDP port 5353 by default on a client install - that's how iTunes/iChat/AFP sharing find other computers. And guess what - it's one of the apps that has a local root exploit in this security update.
  • Comment removed (Score:3, Informative)

    by account_deleted ( 4530225 ) on Sunday May 27, 2007 @09:20AM (#19291475)
    Comment removed based on user account deletion
  • by mkiwi ( 585287 ) on Sunday May 27, 2007 @10:52AM (#19291965)
    This is normail behavior. Mac OS X had to rebuild its kernel extension cache and also had to load in new kexts, redo the prebinding, permissions, etc. Just like MS wants you to restart after installing every little piece of software, Apple wants you to do it whenever you make modifications to the system.
  • Which Microsoft vulnerability are you referring to as being over 10 years old?

    Well, they started out caling it "Active Desktop". It's had other names, but that's where it started.

    The vulnerability is that when you combine ActiveX with the API that applications use to call the HTML control the resulting design is fundamentally impossible even in principle to secure. The problem is that the HTML control is given the responsibility for deciding whether an object its called on to display should be trusted or not, but there the HTML control does not have enough information to make that determination. It's arguable whether the application calling it does, but in every exploit I'm aware of that has made use of this vulnerability to infect the computer giving the application responsibility for that decision would have prevented it.

    The changes required to the API could be:

    (1) Making the control would call back to the application to follow links, access embedded objects, and so on.

    (2) Making the control by itself purely a display mechanism, and requiring explicit installation of extensions by the application.

    (3) Making the sandbox the control uses "hard", and requiring the user or the application to explicitly install plugins based on roles, and making the application explicitly specify the role that the instance of the control takes.

    In addition, in all cases:

    (4) Make the inheritence of the environment absolute. If you follow a link from an application then the target of the link MUST be displayed under the control of the same application. That application can display it by running a more restricted helper application if appropriate (so Windows Explorer could call Internet Explorer) but that decision MUST be made by the application, not the HTML control.

    Except in VERY limited circumstances (such as the default "open safe files after downloading" option in Safari, which CAN BE TURNED OFF) every other browser or mail software follows some variant of these rules (for example, the KHTML/Webkit "IO slaves" follow rule 2). The idea that a program failing to implement one of these rules would be treated as anything less than a critical bug to be fixed as soon as it was discovered was literally a bad joke before 1997. I mean, there were jokes going around about it, because everyone knew nobody would be so stupid as to implement something like Active Desktop.
  • by gig ( 78408 ) on Monday May 28, 2007 @01:31AM (#19297635)
    > Apple's time to patch was about twice as long as Microsoft's in 2006. From the looks of things, they may be working
    > hard on improving that.

    But Apple's bugs were much less severe, and when Apple ships a patch, it goes out to their Software Update system which patches a remarkable number of systems very quickly. Software Update is 8 or more years old, predates Mac OS X. It updates your Mac OS X system with a new version of Mac OS X every quarter or so. The whole platform is a moving target.

    > MOAB

    MOAB was a practical joke, like Borat or Rush Limbaugh, an art project, realpolitik, a propaganda piece. The joke is on you when you cite it as a technical reference.

Make sure your code does nothing gracefully.

Working...