Vulnerabilities / Threats
11/9/2009
08:10 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Apple Releases Snow Leopard Security Patch

Mac OS X 10.6.2 addresses security and stability issues, and resolves a file deletion bug involving Guest accounts.

Apple on Monday released Mac OS X 10.6.2, an update to its Snow Leopard operating system that fixes several dozen security issues and enhances general operating system performance.

The Snow Leopard update addresses 40 security vulnerabilities, many of which occur in open source components of Mac OS X, such as Apache or Subversion.

Security Update 2009-006 describes fixes for Mac OS X 10.6.2 and for earlier Apple operating system versions. It includes 58 Common Vulnerabilities and Exposures (CVE) entries, 18 of which don't affect Snow Leopard.

The 10.6.2 update resolves a bug that could lead to the deletion of files in a user's home directory following a Guest account login. It also repairs an unexpected logout issue, a problem with Spotlight search that prevented Exchange contacts from being seen, and numerous other stability and usability issues, as explained on Apple's Web site.

Among the security flaws fixed is a login bypass vulnerability. "If an account on the system has no password, such as the Guest account, a user may log in to any account without supplying a password," Apple's update summary states. "This update addresses the issue through improved access checks."

Apple is disabling support for X.509 certificates with MD2 encryption for uses other than trusted root certificates. This is due to a weakness in the MD2 hash algorithm identified by IOACTIVE security researcher Dan Kaminsky and Microsoft Vulnerability Research.

Though Apple says an attack on this weakness isn't yet computationally feasible, the company is nonetheless limiting the use of X.509 certificates as "a proactive change to protect users in advance of improved attacks against the MD2 hash algorithm."

The update also addresses several QuickTime and CoreMedia flaws that could be exploited with maliciously crafted media files to allow remote code execution.

A flaw in CUPS, an open source printing system adopted by Apple, could allow a cross-site scripting attack to expose information about print system configuration and the titles of print jobs.

The update can be downloaded using Apple's Software Update preference panel, or from Apple's Web site.

InformationWeek Analytics outlines the 10 questions you need to ask to see where netbooks fit within your organization. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.