Apple Releases 'Highly Critical' Patch 96
Toothpick writes "Apple Insider reports that a new security update is available for download from Apple. This addresses issues identified in sudo, Safari, and OpenSSL among others.
The gory details are, predictably, available on the Apple Info site." Commentary from ZDNet is also available.
Re:Not really (Score:1)
Re:Not really (Score:2)
Re:Not really (Score:1)
Re:Not really (Score:2)
This could wait a few months, right? (Score:5, Funny)
... oh, they did? Before there were any exploits in the wild?
Never mind.It already did (Score:2)
I love Apple's products, I use Macs myself, but they really have to get their act together on security patching.
And there have been proof of concept exploits for some of these vulnerabilities published quite a while ago.
all fine (Score:2)
Re:One problem (Score:3, Interesting)
I installed updates on a 10.3.9 and a 10.4 machine and it appeared fine til I noticed I can't share files anymore between the two machines. Might be a configuration change though.
Re:Problem solved (Score:3, Informative)
Re:helpful list of Apple's recent security updates (Score:5, Informative)
Re:Apple? (Score:1)
Re:Apple? (Score:1)
Re:Apple? (Score:1)
Re:Apple? (Score:1)
Re:Apple? (Score:2)
Re:Apple? (Score:1)
Word is, he was quietly smirking to himself when Rose asked Gates about Dell's recently-stated desire to offer OS X 10.4 on their systems.
Re:Apple? (Score:2)
Re:Apple? (Score:2)
KHTML is LGPLed (the one RMS doesn't really like). If it had been GPLed, Apple wouldn't have touched it with a barge pole.
Re:Apple? (Score:2)
Re:Apple? (Score:5, Interesting)
By the way, both sudo and OpenSSL are OpenBSD spin-offs and nothing at all to do with the GNU project.
Re:Apple? (Score:2)
For that matter, I doubt you need them at all to run a stardard kde+firefox+thunderbird+minesweeper setup.
Re:Apple? (Score:2)
If you removed them and replaced them with BSD counterparts, you would not have a GNU/Linux system, you would have a BSD/Linux system. Similarly, you could remove the Linux kernel and replace it with a FreeBSD kernel built with Linux ABI support and probably not notice (you can even install Debian on a FreeBSD kernel instead of a Linux one). This doesn't mean that the system isn't Linux.
For that
Re:Apple? (Score:2)
I knew that the GNU utils were running on
Re:Apple? (Score:3, Informative)
Re:Apple? (Score:2)
(btw, Nice site you have.)
Re:Apple? (Score:2)
Re:Apple? (Score:5, Funny)
Re:Apple? (Score:2)
How is this news? (Score:5, Insightful)
For those of us who need it, Apple update takes care of it.
If there was an exploit that meant we should click on "Software Update" instead of waiting for it to cycle round, great but this is just Apple-bashing. Is this a microsofty going "look! other OS's have security updates too" while there are many many exploits in the wild for them?
Anyway it's a day late. This is "internet time", if you can remember that far back
Re:How is this news? (Score:1, Troll)
I'm definitely disappointed with Apple's dev team. They should have caught these things
Re:How is this news? (Score:5, Insightful)
So for the most part Apple's methods work well. Of course zero bugs is a good target, but prompt identification and dissemination of fixes is reasonable. It's also pretty tough to craft an exploit that will simply zap Mac users and then get to them before Apple has an opportunity to get the patch out.
One thing Apple should do, though, is make Software Update a bigger part of the Guided Tour, and set it to default to check daily and download critical fixes automatically (right now, it just notifies as default behavior, and checks weekly). I've noticed users who simply ignore Software Update's dialog boxes because they don't understand what it's doing.
Re:How is this news? (Score:5, Insightful)
This is a not a difficult dialog box, and it's explained in the (very short) OS X manual. If a user can't figure this one out either they're illiterate or they just don't want to (much more likely). An absolute worst case scenario would be to ask someone else what it was. The explanation would take mere minutes.
How long did apple wait? (Score:1)
The SUDO flaw was discovered in June 2005 and a patch was released subsequently after...
So 6 months later, Apple decicdes to update their OS? WTF!?!?!
http://www.securityfocus.com/archive/1/402741 [securityfocus.com]
Re:How is this news? (Score:1)
Quite fiercely not. I'm just as anti-ms as the next
I just submitted the story; I left it up to the
Re:How is this news? (Score:2)
All systems run fine. All users are reviewing what they grant admin access, there were no finder exploit , intego like companies are "snake oil" sellers.
All eggs in one basket = foolish boy (Score:2)
If there was an exploit that meant we should click on "Software Update" instead of waiting for it to cycle round, great but this is just Apple-bashing. Is this a microsofty going "look! other OS's have security updates too" while there are many many exploits in the wild for them?
Save that corporate brand wars stuff for someone who cares.
This is about security. People need to be informed; it's how disasters are prevented.
And FYI: not everyon
Nothing to see here (Score:2)
Re:Full disclosure please (Score:2)
Re:Highly Critical? Huh? (Score:5, Funny)
You don't understand the Windows vs. Professional OS sequence for vulnerabilities:
Professional OS:
-Vulnerability found by white hat security world
-OS Vendor informed
-OS Vendor works on patch that both fixes vulnerability and doesn't make things worse
-Vendor tests patch thoroughly
-Vendor releases patch; world as a whole, including script kiddies, first hear about vulnerability
-Users, trusting vendor's track record, install patch (see "doesn't make things worse" above)
-Any exploit is too little, too late.
Microsoft:
-Vulnerability found
-Microsoft informed
-Nature of vulnerability leaks out to world as a whole
-Microsoft shoves thumb up bum, waits 6 months
-Exploit released
-Microsoft shoves second thumb up bum, wonders about apparent discomfort
-Microsoft eventually releases patch, may or may not make things better or worse
-Frustrated people buy Macintoshes
Simple, isn't it?
Re:Highly Critical? Huh? (Score:2)
Huh? Given Microsoft's security record this should mean that Apple's share of PC market is at least 70%...
Re:Highly Critical? Huh? (Score:3, Insightful)
If most people were as easily frustrated and as aware of why they should be frustrated and care about security as you and I are, it would be. But it's amazing how much crap people are willing to accept as a normal cost of using computers.
I find myself regularly watching people put up with horribly broken systems and, after I fix the problem (because I can't even stand watching someone suffer), they're shocke
Re:Highly Critical? Huh? (Score:2)
There is no
Re:Highly Critical? Huh? (Score:2)
I agree, more on that later...
I personally prefer Thunderbird or Opera, but I understand from other people that it's not nearly enough for serious business users.
I'm sorry, but "I understand from other people" doesn't cut it. Also, a system administrator's place is implementing and where appropriate guiding business policy, not simply doing what "I understand from other people" is the best solution.
I had to make a business case for this ban. I had
Re:Highly Critical? Huh? (Score:2)
If you are a system administrator, your e-mail/calendar/web access needs are drastically different from your users, so "unders
Re:Highly Critical? Huh? (Score:2)
I'm sorry, but it's just not true that 5% or 1% or any% of users actually need Outlook more than everyone else, and you can just give Outlook to those and keep everyone else on whatever mail interface they want. To make these things useful you need everyone to be
Re:Highly Critical? Huh? (Score:2)
I am glad that your PHP calendar works so well on PDAs, cell phones and notebooks without network connectivity. But other companies where executives do travel and make appointments on the go might ask non-Outlook users to use web interface for calendar. I assume you know that Exchange is not the only
Re:Highly Critical? Huh? (Score:2)
MSDN and Windows Update are special cases, and you know that... and Windows Update runs the HTML control for its access even if you pick another default browser, so that's a non-issue.
In addition, how does your company get customers outside slashdot if
Re:Highly Critical? Huh? -- Explained (Score:5, Funny)
Re:Highly Critical? Huh? (Score:1)
What a shock? (Score:2)
Actually, I am a HUGE Apple fan. They are pretty timely with their updates. They don't let an exploit linger for long. Neither do most Linux distros.
I tend to wonder though, when it comes to MS Patching stuff like IE, does Microsoft delay because the fix breaks too manyu things? MS has said before that IE can't be fully standards compliant because it would break too many intranets.
Re:What a shock? (Score:2, Funny)
The reason Microsoft patches to IE take so long is that their quality control is so good. They view every web page on the internet with each new version of IE before releasing it. Of course, by they time they do, some of those pages have changed such that they break, but Microsoft isn't responsible for that.
Whoosh? (Score:2)
IE has bigger problems than that... (Score:2)
But if they're prepared to stonewall on deep security flaws, why do you expect them to
There's vulnerablity in MacOS X... (Score:1)
Take the update at face value, friends.
Re:There's vulnerablity in MacOS X... (Score:2)
The interesting commentary (Score:3, Informative)
http://www.securityfocus.com/news/11359
Look at the numbers. Whoever would have thought that the numbers for MS and Apple would have got this close? Complacency is their, and their users, greatest danger right now. You can see it in most of this thread. Time to wake up.Re:The interesting commentary (Score:5, Insightful)
Re: (Score:2)
Two things... (Score:5, Insightful)
Say I wanted to market X, and say that I'm a sneaky and underhand individual. I might purchase or support a website dedicated either to X or anti-X and have *some* articles on it that suit my purpose. I wouldn't undermine the integrity of the site (well, much), but I would use it as an authoratitive mouthpiece that mouthed off about *my* preferred direction.
So, ok I'm a cynic, but so far my cynicism has been proved right depressingly often. Sigh.
2) "Looking at the numbers" is no useful guide to pretty much anything to do with security. The phrase works when the numbers themselves are the pertinent facts (eg: a bank-balance sheet). "Humans are obviously not the dominant species on the planet - there are millions more houseflys. Look at the numbers".
The point is that one dose of cancer can kill you, but you may survive fifty or more infections of the common cold without significant harm. The numbers don't tell you the relative importance of the problem, and indeed may just reflect different counting methods or diligence in detection.
Simon.
Re:Two things... (Score:1)
Insightful sig!
Microsoft is the question... the question that has been driving us..........insane.
Re:The interesting commentary (Score:4, Informative)
Look at the numbers. Whoever would have thought that the numbers for MS and Apple would have got this close?
Counting the number of bugfixes released is no measure a a system's security. The number of remote vulnerabilities on a default install of the OS, the ease of exploiting those vulnerabilities, the number of local exploits, and the likelihood of an exploit happening are all factors. Additionally, predictive criteria, like past performance and the exposure and design of the architecture may be useful. If you look at Windows it has innumerable unpatched local vulnerabilities and working exploits that have existed for many years. They don't even bother fixing them most of the time. OS X on the other hand has a handful of potential local priviledge escalations vulnerabilities, that are fixed in a timely manner, and with one or two proof of concept exploits (none unpatched). Windows has a number of long running remote vulnerabilities and they crop up every month. Exploits for these vulnerabilities occasionally appear before a fix is available for the vulnerability, and regularly appear before administrators have time to thoroughly test those fixes (which is very necessary due to the kludgy Windows architecture and their history of catastrophically broken patches). On OS X I am unaware of any remote vulnerability with a published exploit that preceded the fix for that vulnerability.
The ease of exploitation of vulnerabilities on Windows is much higher due to the lack of a usable non-admin environment, non-network services that run exposed on the network, default settings that run unneeded services, auto execution of scripts and executables within default and unremovable applications, ease of concealing the nature of an executable in the GUI, integration of web browsing and file browsing code, lack of packaging for executables, shared registry, and larger install base for automated propagation. OS X is by no means perfect and experiences regular security flaws. Much of the security auditing that is done, is a side benefit of the open source user environment components OS X shares with other UNIX-like systems. I'd be much happier if Apple did some more thorough security testing of their products. That said, to make the argument that the security of OS X is approaching the same level of complete cluster-fuckedness that is Windows based solely on counting the number of vulnerabilities patched by the respective vendors is ludicrous.
These are serious.. but kudos for fixing them. (Score:5, Interesting)
"one thing i looove about this thing is that i'm never afraid to update like in windows. i'm not scared that it will be worse off"
Trust is important. How many people haven't updated Windows to SP2 still??
Re:These are serious.. but kudos for fixing them. (Score:4, Insightful)
Forget SP2, how many haven't updated to XP ??
Re:These are serious.. but kudos for fixing them. (Score:3, Funny)
Re:These are serious.. but kudos for fixing them. (Score:5, Insightful)
A more complex system with boobytraps deliberately hidden in the kernel and dubious anti-virus enhancements that actually make cleaning up malware harder? Yeh, I've gotta get me some of that. Plus, 2000 ships with a version of Windows Media Player old enough that it doesn't have its DRM tentacles coiled around the kernel's balls.
I'm also going to be staying clear of the new Intel-based Macs until I'm reasonably confident they don't have boobytraps or effective "strong DRM" support. Not because I want to pirate software or rip protected CDs, but because that stuff's toxic.
Re:These are serious.. but kudos for fixing them. (Score:2)
Andrew
PS: I love the last sentence of your second paragraph.
Re:These are serious.. but kudos for fixing them. (Score:2)
I just don't want the REST of the baggage that would have to come along with any kind of effective DRM, which REALLY imply a closed source kernel and legal and technical restrictions on even necessary reverse engineering.
Re:These are serious.. but kudos for fixing them. (Score:2)
In any case - the first thing I do with any Windows machine is strip out all the stupid unnecessary services, including Windows Update. That thing is the most moronic thing I've ever seen. Half the time, after rebooting, some piece of software no longer works at all, or, better yet, you'll start doing a checkdisk on startup and start seeing "lost cluster found"
Re:These are serious.. but kudos for fixing them. (Score:1)
What did you need to run that had to have XP rather than Win2k?
Re:These are serious.. but kudos for fixing them. (Score:2)
If games only came in Mac versions as well at the same time.
Re:These are serious.. but kudos for fixing them. (Score:1)
Re:These are serious.. but kudos for fixing them. (Score:1)
Re:These are serious.. but kudos for fixing them. (Score:2)
Re:These are serious.. but kudos for fixing them. (Score:1)
If the trust in Apple is just "ignorant", it's still has a great result. Most non-geek Mac users I know do regular updates. Most non-geek Windows users I know, don't.
Re:These are serious.. but kudos for fixing them. (Score:2)
Probably a lot of business have not. We have not rolled out SP2 at work yet and probably never will. We rely on exterprise level security tools rather than the crap MSFT provides in SP2 and the former is less likely to break the software we use.
Microsoft vs Apple (Score:5, Insightful)
Apple: the latest security hole in Webkit is a buffer overflow in URLs. The first anyone hears of it is a patch through Software Update.
my take (Score:3, Interesting)
Advisories (2003-2005) OSX 57 & XP Pro 102
As for vendor patches Apple is at 100%... not bad.
(XP Professional) http://secunia.com/product/22/ [secunia.com]
and...
(Mac OS X) http://secunia.com/product/96/ [secunia.com]
Is any system perfect... no (even OpenBSD admits to 1 hole in 8 years), but Apple does make it as painless as possible.
so what (Score:1)
Credit where it's due (Score:2)