MAC security Patches
My only question with MAC is how can they say their OS is the best one out there and yet have around 5% of the market share? I like Unix and Linux and I am an administrator on Linux servers, but I just don’t like how they play up the glitches in other operating systems and not their own. So here is a little proof that they are not so perfect. Plus I would think that if MAC usage went up to even 15% of the market, they would start seeing some of the viruses that Microsoft has. Oh well just my thoughts, here is the list of patches from information world.
Mac OS X 10.6.2 addresses security and stability issues, and resolves a file deletion bug involving Guest accounts.
Apple on Monday released Mac OS X 10.6.2, an update to its Snow Leopard operating system that fixes several dozen security issues and enhances general operating system performance.
The Snow Leopard update addresses 40 security vulnerabilities, many of which occur in open source components of Mac OS X, such as Apache or Subversion.
http://api.mspoke.com/techweb/click?impressionid=1257825018719&itemid=20090101_1434948_532&url=http 3A%2F2Fwww.informationweek.com%2Fwhitepaper%2FSoftware%2FDevelopment-Tools%2Fsiemon-versapod-solution-for-data-center-infrastructurewp1252653335588%3Fcid%3Dwell4_vid_sec_CI Harris Stratex CIO Richard Plane explores the changing role of the CIO, especially given the new balancing act required today — namely, balancing cost cutting and continued innovation.Security Update 2009-006 describes fixes for Mac OS X 10.6.2 and for earlier Apple operating system versions. It includes 58 Common Vulnerabilities and Exposures (CVE) entries, 18 of which don’t affect Snow Leopard.
The 10.6.2 update resolves a bug that could lead to the deletion of files in a user’s home directory following a Guest account login. It also repairs an unexpected logout issue, a problem with Spotlight search that prevented Exchange contacts from being seen, and numerous other stability and usability issues, as explained on Apple’s Web site.
Among the security flaws fixed is a login bypass vulnerability. “If an account on the system has no password, such as the Guest account, a user may log in to any account without supplying a password,” Apple’s update summary states. “This update addresses the issue through improved access checks.”
Apple is disabling support for X.509 certificates with MD2 encryption for uses other than trusted root certificates. This is due to a weakness in the MD2 hash algorithm identified by IOACTIVE security researcher Dan Kaminsky and Microsoft (NSDQ: MSFT) Vulnerability Research.
Though Apple says an attack on this weakness isn’t yet computationally feasible, the company is nonetheless limiting the use of X.509 certificates as “a proactive change to protect users in advance of improved attacks against the MD2 hash algorithm.”
The update also addresses several QuickTime and CoreMedia flaws that could be exploited with maliciously crafted media files to allow remote code execution. A flaw in CUPS, an open source printing system adopted by Apple, could allow a cross-site scripting attack to expose information about print system configuration and the titles of print jobs.