Article

Apple fixes 25 Mac OS X flaws

SearchSecurity.com Staff
Apple has released a mega-fix for Mac OS X, sealing about two dozen security holes attackers could exploit to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code on targeted machines.

    Requires Free Membership to View

The 25 flaws include the following:

  • An error in the AFP Client that executes commands without properly cleaning the environment. Local attackers could exploit this to create malicious files or execute arbitrary commands with system privileges.

  • A buffer overflow error in the AirPortDriver module that surfaces when malformed control commands are processed. Attackers could exploit this to run malicious code with elevated privileges on eMac, iBook, iMac, PowerBook G3, PowerBook G4, or Power Mac G4 systems equipped with an original AirPort card.

  • An error in the CoreServices interprocess communication local users could exploit to obtain a send right to the Mach task port and execute arbitrary code with elevated privileges.

  • An error in Libinfo that does not properly report errors to applications. Malicious Web sites could exploit this to run malicious code.

  • An integer overflow error in the RPC library that surfaces when the operating system processes malformed requests sent to the portmap service. Attackers could exploit this to cause a denial of service or run malicious code with "daemon" privileges.

  • An error in the software update window that may appear beneath the login window when a scheduled task is run under certain conditions. Attackers could exploit this to log in without authentication if they have physical access to the system.

  • A design error where the username and password used to mount remote filesystems through connections to SMB servers are passed to the "mount_smb" command as command line arguments, which could be exploited by a local attacker to obtain other user's authentication credentials.
  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: