Vulnerabilities / Threats
3/15/2013
01:46 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple OS X Update Fixes 21 Vulnerabilities

Patch for OS X Mountain Lion closes security holes and improves stability.

Apple iWatch Vs. Smartwatches Past And Present
Apple iWatch Vs. Smartwatches Past And Present
(click image for larger view and for slideshow)
Only a week after Apple SVP Phil Schiller called attention to security issues affecting Google's Android operating system, Apple has updated its OS X operating system to make it more secure.

Apple's OS X Mountain Lion v10.8.3 Update, released on Thursday through the company's Software Update mechanism and as a download from Apple's website, includes a variety of changes to improve stability and compatibility as well as security.

The update adds the ability to redeem iTunes gift cards in the Mac App Store with the camera built into today's Macs, as well as Boot Camp support for Windows 8 and 3TB drives. It improves the compatibility of the Notes app with IMAP servers, the Mail app with Microsoft Exchange and the Contacts app with printing. And it resolves a variety of bugs affecting different Apple applications including Safari, as documented in the update's release notes.

[ Tired of ads? You won't get any relief at Google Play. Read Google Play Bans Ad Blocking. ]

But the security fixes are the most necessary changes. The update addresses 21 vulnerabilities, 11 of which could be exploited to allow remote code execution.

Last month, Apple released an update that patched 30 Java flaws in the version of Java 6 that the company maintains, shortly after the company reportedly acknowledged that a zero-day Java flaw had led to the compromise of Mac OS X computers at Apple and other companies.

Java doesn't retain its starring role in Thursday's update, but it does play a part. In a blog post, Sophos security researcher Paul Ducklin characterized CVE-2013-0967 as the most interesting bug fix. Apple warns that the flaw (in OS X's Core Types component) could allow a malicious website to launch a Java Web Start application even if the Java plug-in has been disabled.

"It'll be something of a surprise for anyone who was relying on Apple's newfound strictness against Java to find that turning Java off in your browser didn't necessarily have the desired effect," Ducklin observed.

Apple has also fixed an error in the way VoiceOver interacted with the Login Window. The flaw allowed a person with keyboard access to launch the System Preferences control panel and alter system configuration details prior to login.

F-Secure security researcher Sean Sullivan noted in a blog post that Apple patched security issues related to some of the ostensibly "safe" file types that are opened by default when downloaded by the company's Safari browser. He recommends unchecking the checkbox that confirms this default setting.

Attend Interop Las Vegas May 6-10 and learn the emerging trends in information risk management and security. Use Priority Code MPIWK by March 22 to save an additional $200 off the early bird discount on All Access and Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology. Register today!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
4/1/2013 | 2:04:30 AM
re: Apple OS X Update Fixes 21 Vulnerabilities
I like that fact tart Apple is addressing these vulnerabilities but is it only prompted by the Android security flaws? I would like to think that Apple came up with these fixes without any outside influence but I donGÇÖt believe that. 11 of these flaws allowed for remote access, really half the flaws that can exploited are done so remotely. Either way glad that Apple released the patches for the security updates. I guess we will have to wait to see if Apple follow suit with any other sudden updates.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.