Get the Patch for Mac OS X

If you are running Macs on your network, be advised that Apple has rolled out a 'highly critical' security update to plug several vulnerabilities in its Mac OS X server and client versions.

By Ryan Naraine | Posted May 4, 2004
Page of   |  Back to Page 1
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn
If you are running Macs on your netork, be advised that Apple Computer has rolled out a major security update to plug several vulnerabilities in its flagship Mac OS X server and client versions.

The patch, which is being described as "highly critical," addresses security issues with the AFP Server, CoreFoundation and IPSec and also integrates a previously issued patch which contained bugs, Apple said.

The latest flaws, discovered by researchers at @Stake, could lead to system hijack, security bypass, manipulation of data, privilege escalation, denial-of-service attacks and system access.

The most serious flaw was found with AppleFileServer and can be exploited to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the password handling and could allow attackers to cause a buffer overflow by passing an AFP "LoginExt" packet with a string in the "PathName" field.

"Successful exploitation allows execution of arbitrary code with 'root' privileges," according to a separate warning issued by independent research firm Secunia.

Secunia said it tagged the flaw as "highly critical" because Apple's advisory was vague and that the "unspecified issues are likely to be more severe than claimed by the vendor."

"This conclusion is based on the fact that Apple merely describes vulnerability 3 as an attempt to "improve the handling of long passwords". However, according to @stake, the vulnerability can in fact be exploited to compromise a vulnerable system," Secunia explained.

The patch also addresses some older known vulnerabilities in Apache 2 which can be exploited by malicious attackers to inject malicious code into log files and cause a denial-of-service condition.

Wait an IPSec
A fix was also issued for two vulnerabilities in the IPSec implementation that could lead to MitM attacks (man-in-the-middle), establish unauthorized connections, or cause a DoS.

Apple also confirmed the existence of an unspecified vulnerability within the CoreFoundation when handling environment variables. This may potentially be a privilege escalation vulnerability. Another flaw in RAdmin when handling large requests was also pinpointed. Secunia warned that this issue could potentially lead to system compromise problems.

Apple has posted download links for the appropriate security update on its Web site. The full @Stake advisory is availab le here.

Article courtesy of Internetnews.com.

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter