Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Nine bug fixes from Apple

Nine bug fixes from Apple

by Nikola Strahija on March 24th, 2005 Apple posted security updates recently to fix nine security vulnerabilities in its Mac OS X operating system. Both client and server versions of the latest version of its software need patching.


First, there are two security bugs in the Apple Filing Protocol that could create a means for attackers to either launch a denial of service attack or discover the contents of a drop box. In addition, a buffer overflow problem in Core Foundation, which creates a means for crackers to inject hostile code into vulnerable systems, has been discovered and patched.

Apple has also updated its Safari browser software to guard against the obfuscation of domain names in the International Domain Names format that creates a possible means to engineer more convincing phishing attacks. Opera and Mozilla have both updated their browser software to respond to the same issue over recent weeks.

Other software fixes include: an update to the Cyrus IMAP client in Mac OS X server software; an upgrade for Cyrus SASL to address denial of service risks; and a fix for a serious security bug in folder permissions, which creates a mechanism for all manner of mischief including privilege escalation attacks. A patch for Apple's Mailman mailing list package to guard against directory transversal attacks is also on the list. Finally there's a patch for Mac OS X client and server software to address a Bluetooth setup security glitch.

The patches can be downloaded but for most users these will have already been automatically applied after they were issued on Monday, 21 March.


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »