Vulnerabilities / Threats
3/15/2013
01:46 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Apple OS X Update Fixes 21 Vulnerabilities

Patch for OS X Mountain Lion closes security holes and improves stability.

Apple iWatch Vs. Smartwatches Past And Present
Apple iWatch Vs. Smartwatches Past And Present
(click image for larger view and for slideshow)
Only a week after Apple SVP Phil Schiller called attention to security issues affecting Google's Android operating system, Apple has updated its OS X operating system to make it more secure.

Apple's OS X Mountain Lion v10.8.3 Update, released on Thursday through the company's Software Update mechanism and as a download from Apple's website, includes a variety of changes to improve stability and compatibility as well as security.

The update adds the ability to redeem iTunes gift cards in the Mac App Store with the camera built into today's Macs, as well as Boot Camp support for Windows 8 and 3TB drives. It improves the compatibility of the Notes app with IMAP servers, the Mail app with Microsoft Exchange and the Contacts app with printing. And it resolves a variety of bugs affecting different Apple applications including Safari, as documented in the update's release notes.

[ Tired of ads? You won't get any relief at Google Play. Read Google Play Bans Ad Blocking. ]

But the security fixes are the most necessary changes. The update addresses 21 vulnerabilities, 11 of which could be exploited to allow remote code execution.

Last month, Apple released an update that patched 30 Java flaws in the version of Java 6 that the company maintains, shortly after the company reportedly acknowledged that a zero-day Java flaw had led to the compromise of Mac OS X computers at Apple and other companies.

Java doesn't retain its starring role in Thursday's update, but it does play a part. In a blog post, Sophos security researcher Paul Ducklin characterized CVE-2013-0967 as the most interesting bug fix. Apple warns that the flaw (in OS X's Core Types component) could allow a malicious website to launch a Java Web Start application even if the Java plug-in has been disabled.

"It'll be something of a surprise for anyone who was relying on Apple's newfound strictness against Java to find that turning Java off in your browser didn't necessarily have the desired effect," Ducklin observed.

Apple has also fixed an error in the way VoiceOver interacted with the Login Window. The flaw allowed a person with keyboard access to launch the System Preferences control panel and alter system configuration details prior to login.

F-Secure security researcher Sean Sullivan noted in a blog post that Apple patched security issues related to some of the ostensibly "safe" file types that are opened by default when downloaded by the company's Safari browser. He recommends unchecking the checkbox that confirms this default setting.

Attend Interop Las Vegas May 6-10 and learn the emerging trends in information risk management and security. Use Priority Code MPIWK by March 22 to save an additional $200 off the early bird discount on All Access and Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology. Register today!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
4/1/2013 | 2:04:30 AM
re: Apple OS X Update Fixes 21 Vulnerabilities
I like that fact tart Apple is addressing these vulnerabilities but is it only prompted by the Android security flaws? I would like to think that Apple came up with these fixes without any outside influence but I donG«÷t believe that. 11 of these flaws allowed for remote access, really half the flaws that can exploited are done so remotely. Either way glad that Apple released the patches for the security updates. I guess we will have to wait to see if Apple follow suit with any other sudden updates.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.