Vulnerabilities / Threats
3/15/2013
01:46 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Apple OS X Update Fixes 21 Vulnerabilities

Patch for OS X Mountain Lion closes security holes and improves stability.

Apple iWatch Vs. Smartwatches Past And Present
Apple iWatch Vs. Smartwatches Past And Present
(click image for larger view and for slideshow)
Only a week after Apple SVP Phil Schiller called attention to security issues affecting Google's Android operating system, Apple has updated its OS X operating system to make it more secure.

Apple's OS X Mountain Lion v10.8.3 Update, released on Thursday through the company's Software Update mechanism and as a download from Apple's website, includes a variety of changes to improve stability and compatibility as well as security.

The update adds the ability to redeem iTunes gift cards in the Mac App Store with the camera built into today's Macs, as well as Boot Camp support for Windows 8 and 3TB drives. It improves the compatibility of the Notes app with IMAP servers, the Mail app with Microsoft Exchange and the Contacts app with printing. And it resolves a variety of bugs affecting different Apple applications including Safari, as documented in the update's release notes.

[ Tired of ads? You won't get any relief at Google Play. Read Google Play Bans Ad Blocking. ]

But the security fixes are the most necessary changes. The update addresses 21 vulnerabilities, 11 of which could be exploited to allow remote code execution.

Last month, Apple released an update that patched 30 Java flaws in the version of Java 6 that the company maintains, shortly after the company reportedly acknowledged that a zero-day Java flaw had led to the compromise of Mac OS X computers at Apple and other companies.

Java doesn't retain its starring role in Thursday's update, but it does play a part. In a blog post, Sophos security researcher Paul Ducklin characterized CVE-2013-0967 as the most interesting bug fix. Apple warns that the flaw (in OS X's Core Types component) could allow a malicious website to launch a Java Web Start application even if the Java plug-in has been disabled.

"It'll be something of a surprise for anyone who was relying on Apple's newfound strictness against Java to find that turning Java off in your browser didn't necessarily have the desired effect," Ducklin observed.

Apple has also fixed an error in the way VoiceOver interacted with the Login Window. The flaw allowed a person with keyboard access to launch the System Preferences control panel and alter system configuration details prior to login.

F-Secure security researcher Sean Sullivan noted in a blog post that Apple patched security issues related to some of the ostensibly "safe" file types that are opened by default when downloaded by the company's Safari browser. He recommends unchecking the checkbox that confirms this default setting.

Attend Interop Las Vegas May 6-10 and learn the emerging trends in information risk management and security. Use Priority Code MPIWK by March 22 to save an additional $200 off the early bird discount on All Access and Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology. Register today!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
4/1/2013 | 2:04:30 AM
re: Apple OS X Update Fixes 21 Vulnerabilities
I like that fact tart Apple is addressing these vulnerabilities but is it only prompted by the Android security flaws? I would like to think that Apple came up with these fixes without any outside influence but I donG«÷t believe that. 11 of these flaws allowed for remote access, really half the flaws that can exploited are done so remotely. Either way glad that Apple released the patches for the security updates. I guess we will have to wait to see if Apple follow suit with any other sudden updates.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.