Vulnerabilities / Threats
3/15/2013
01:46 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Apple OS X Update Fixes 21 Vulnerabilities

Patch for OS X Mountain Lion closes security holes and improves stability.

Apple iWatch Vs. Smartwatches Past And Present
Apple iWatch Vs. Smartwatches Past And Present
(click image for larger view and for slideshow)
Only a week after Apple SVP Phil Schiller called attention to security issues affecting Google's Android operating system, Apple has updated its OS X operating system to make it more secure.

Apple's OS X Mountain Lion v10.8.3 Update, released on Thursday through the company's Software Update mechanism and as a download from Apple's website, includes a variety of changes to improve stability and compatibility as well as security.

The update adds the ability to redeem iTunes gift cards in the Mac App Store with the camera built into today's Macs, as well as Boot Camp support for Windows 8 and 3TB drives. It improves the compatibility of the Notes app with IMAP servers, the Mail app with Microsoft Exchange and the Contacts app with printing. And it resolves a variety of bugs affecting different Apple applications including Safari, as documented in the update's release notes.

[ Tired of ads? You won't get any relief at Google Play. Read Google Play Bans Ad Blocking. ]

But the security fixes are the most necessary changes. The update addresses 21 vulnerabilities, 11 of which could be exploited to allow remote code execution.

Last month, Apple released an update that patched 30 Java flaws in the version of Java 6 that the company maintains, shortly after the company reportedly acknowledged that a zero-day Java flaw had led to the compromise of Mac OS X computers at Apple and other companies.

Java doesn't retain its starring role in Thursday's update, but it does play a part. In a blog post, Sophos security researcher Paul Ducklin characterized CVE-2013-0967 as the most interesting bug fix. Apple warns that the flaw (in OS X's Core Types component) could allow a malicious website to launch a Java Web Start application even if the Java plug-in has been disabled.

"It'll be something of a surprise for anyone who was relying on Apple's newfound strictness against Java to find that turning Java off in your browser didn't necessarily have the desired effect," Ducklin observed.

Apple has also fixed an error in the way VoiceOver interacted with the Login Window. The flaw allowed a person with keyboard access to launch the System Preferences control panel and alter system configuration details prior to login.

F-Secure security researcher Sean Sullivan noted in a blog post that Apple patched security issues related to some of the ostensibly "safe" file types that are opened by default when downloaded by the company's Safari browser. He recommends unchecking the checkbox that confirms this default setting.

Attend Interop Las Vegas May 6-10 and learn the emerging trends in information risk management and security. Use Priority Code MPIWK by March 22 to save an additional $200 off the early bird discount on All Access and Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology. Register today!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
4/1/2013 | 2:04:30 AM
re: Apple OS X Update Fixes 21 Vulnerabilities
I like that fact tart Apple is addressing these vulnerabilities but is it only prompted by the Android security flaws? I would like to think that Apple came up with these fixes without any outside influence but I donGÇÖt believe that. 11 of these flaws allowed for remote access, really half the flaws that can exploited are done so remotely. Either way glad that Apple released the patches for the security updates. I guess we will have to wait to see if Apple follow suit with any other sudden updates.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4973
Published: 2014-09-23
The ESET Personal Firewall NDIS filter (EpFwNdis.sys) driver in the Firewall Module Build 1183 (20140214) and earlier in ESET Smart Security and ESET Endpoint Security products 5.0 through 7.0 allows local users to gain privileges via a crafted argument to a 0x830020CC IOCTL call.

CVE-2014-5392
Published: 2014-09-23
XML External Entity (XXE) vulnerability in JobScheduler before 1.6.4246 and 7.x before 1.7.4241 allows remote attackers to cause a denial of service and read arbitrary files or directories via a request containing an XML external entity declaration in conjunction with an entity reference.

CVE-2014-6646
Published: 2014-09-23
The bellyhoodcom (aka com.tapatalk.bellyhoodcom) application 3.4.23 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6647
Published: 2014-09-23
The ElForro.com (aka com.tapatalk.elforrocom) application 2.4.3.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6648
Published: 2014-09-23
The iPhone4.TW (aka com.tapatalk.iPhone4TWforums) application 3.3.20 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio