Risk
5/15/2012
11:37 AM
50%
50%

Apple Inoculates OS X Leopard Against Flashback

Apple security update for older OS 10.5 Leopard nukes Flashback variants and disables outdated Java and Flash functionality.

In the wake of the Flashback malware outbreak that last month infected more than 600,000 Macs, Apple Monday pushed two security fixes for users of OS X 10.5 Leopard.

Flashback was the largest-ever malware outbreak involving OS X users, and at its peak exploited over 600,000 Macs. The malware spread by targeting a Java vulnerability that was first disclosed in a Windows security notice in February 2012. Apple last month released Flashback eradication software for its current Mac operating system, 10.7 Lion, as well as for 10.6 Snow Leopard.

Now, the 10.5 Leopard version of Apple's new Flashback Removal Security Update will likewise search for multiple Flashback variants, including SabPub. "This update removes the most common variants of the Flashback malware," according to the update's release notes. "If the Flashback malware is found, a dialog will notify you that malware was removed. In some cases, the update may need to restart your computer in order to completely remove the Flashback malware."

Apple Monday also released a security update for 10.5 Leopard that disables Java, as well "versions of Adobe Flash Player that do not include the latest security updates, and provides the option to get the current version from Adobe's website," according to the update notes. That mirrors functionality that Apple already introduced for OS 10.7 and 10.6. But to install this update, Leopard users must be running the most recent version--10.5.8--of the operating system.

[ Macs have been safer than Windows PCs, but every security-savvy IT pro knows "safer" isn't "totally safe." Learn why After Flashback, Apple Walled Gardens Won't Help. ]

While 63% of Flashback infections affected OS 10.6 Snow Leopard, and only 11% affected OS 10.7 Lion users, 25% of the infections were traced to OS 10.5 Leopard users, even though it's only used by 13% of all Mac users.

Apple's release of operating system patches to nuke Flashback, as well as its decision to proactively disable unused Java--though it can be reinstalled--and outdated versions of Flash Player have garnered praise from security experts, as well as the developers behind the add-ons.

Notably, Adobe security chief Brad Arkin lauded the update for Safari that automatically disables outdated Flash Player installations. "We welcome today's initiative by Apple to encourage Mac users to stay up-to-date: With the Apple Safari 5.1.7 update released today, Apple is disabling older versions of Flash Player (specifically Flash Player 10.1.102.64 and earlier) and directing users to the Flash Player Download Center, from where they can install the latest, most secure version of Flash Player," he said in a blog post.

Despite the slew of 10.5 fixes, Apple said it is prepping its new OS X 10.8 Mountain Lion operating system for a late summer launch. Mac watchers, however, have seen signs that the operating system might debut during Apple's 2012 Worldwide Developer Conference, which will be held in San Francisco June 11 through June 15.

Some commentators have wondered whether Apple, with the introduction of OS 10.8, would continue its practice of no longer releasing new security patches for all but the current and previous operating system, which in this case would be 10.7 Lion. But Apple's Monday introduction of 10.5 fixes shows that, at least in the case of a mass malware outbreak of Flashback proportions, Apple appears ready to roll out relevant patches, especially since older versions of its operating system would have the potential to keep infecting newer ones.

"It's encouraging to see Apple has not left users of this older version of the Mac OS X operating system completely out in the cold when it comes to protecting against the latest threats," said Graham Cluley, senior technology consultant at free Mac antivirus maker Sophos, in a blog post. "Clearly they realize that it's not good for the Apple Mac's image if older computers connected to the Internet are harboring malware that could cause problems for others in the Mac community."

Security information and event monitoring technology has been available for years, but the information can be hard to mine. In our SIEM Success report, we provide a step-by-step guide to make the most of your SIEM system. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
5/18/2012 | 6:51:49 PM
re: Apple Inoculates OS X Leopard Against Flashback
One caveat to above story: A reader informs me that the Flashback Removal Security Update and Leopard Security Update 2012-003 for OSX 10.5 (Leopard) will **not** run on on PowerPC hardware. Apple's support and download sites don't mention that fact.

Inquiring, the reader said he was told by an Apple Support Engineer that Apple doesn't intend to issue any updates for PPC hardware, which has been deemed to be outside Apple's "window of coverage." ... "So Apple is getting more kudos than they truly deserve for dealing with this issue," he notes. (Thanks for the tip.)
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

CVE-2014-7880
Published: 2014-12-17
Multiple unspecified vulnerabilities in the POP implementation in HP OpenVMS TCP/IP 5.7 before ECO5 allow remote attackers to cause a denial of service via unspecified vectors.

CVE-2014-8133
Published: 2014-12-17
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.