Vulnerabilities / Threats
3/15/2013
01:46 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple OS X Update Fixes 21 Vulnerabilities

Patch for OS X Mountain Lion closes security holes and improves stability.

Apple iWatch Vs. Smartwatches Past And Present
Apple iWatch Vs. Smartwatches Past And Present
(click image for larger view and for slideshow)
Only a week after Apple SVP Phil Schiller called attention to security issues affecting Google's Android operating system, Apple has updated its OS X operating system to make it more secure.

Apple's OS X Mountain Lion v10.8.3 Update, released on Thursday through the company's Software Update mechanism and as a download from Apple's website, includes a variety of changes to improve stability and compatibility as well as security.

The update adds the ability to redeem iTunes gift cards in the Mac App Store with the camera built into today's Macs, as well as Boot Camp support for Windows 8 and 3TB drives. It improves the compatibility of the Notes app with IMAP servers, the Mail app with Microsoft Exchange and the Contacts app with printing. And it resolves a variety of bugs affecting different Apple applications including Safari, as documented in the update's release notes.

[ Tired of ads? You won't get any relief at Google Play. Read Google Play Bans Ad Blocking. ]

But the security fixes are the most necessary changes. The update addresses 21 vulnerabilities, 11 of which could be exploited to allow remote code execution.

Last month, Apple released an update that patched 30 Java flaws in the version of Java 6 that the company maintains, shortly after the company reportedly acknowledged that a zero-day Java flaw had led to the compromise of Mac OS X computers at Apple and other companies.

Java doesn't retain its starring role in Thursday's update, but it does play a part. In a blog post, Sophos security researcher Paul Ducklin characterized CVE-2013-0967 as the most interesting bug fix. Apple warns that the flaw (in OS X's Core Types component) could allow a malicious website to launch a Java Web Start application even if the Java plug-in has been disabled.

"It'll be something of a surprise for anyone who was relying on Apple's newfound strictness against Java to find that turning Java off in your browser didn't necessarily have the desired effect," Ducklin observed.

Apple has also fixed an error in the way VoiceOver interacted with the Login Window. The flaw allowed a person with keyboard access to launch the System Preferences control panel and alter system configuration details prior to login.

F-Secure security researcher Sean Sullivan noted in a blog post that Apple patched security issues related to some of the ostensibly "safe" file types that are opened by default when downloaded by the company's Safari browser. He recommends unchecking the checkbox that confirms this default setting.

Attend Interop Las Vegas May 6-10 and learn the emerging trends in information risk management and security. Use Priority Code MPIWK by March 22 to save an additional $200 off the early bird discount on All Access and Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology. Register today!

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
4/1/2013 | 2:04:30 AM
re: Apple OS X Update Fixes 21 Vulnerabilities
I like that fact tart Apple is addressing these vulnerabilities but is it only prompted by the Android security flaws? I would like to think that Apple came up with these fixes without any outside influence but I donGÇÖt believe that. 11 of these flaws allowed for remote access, really half the flaws that can exploited are done so remotely. Either way glad that Apple released the patches for the security updates. I guess we will have to wait to see if Apple follow suit with any other sudden updates.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

CVE-2014-9197
Published: 2015-01-27
The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware before 1.60 IR 04 stores rde.jar under the web root with insufficient access control, which allows remote attackers to obtain sensitive setup and configuration information via a direct request.

CVE-2014-9198
Published: 2015-01-27
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 IR 04 has hardcoded credentials, which makes it easier for remote attackers to obtain access via an FTP session.

CVE-2014-9646
Published: 2015-01-27
Unquoted Windows search path vulnerability in the GoogleChromeDistribution::DoPostUninstallOperations function in installer/util/google_chrome_distribution.cc in the uninstall-survey feature in Google Chrome before 40.0.2214.91 allows local users to gain privileges via a Trojan horse program in the ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.