Apple has pushed out a large security update for Snow Leopard, as well as other Mac applications. The update fixes 39 vulnerabilities.
The company also released OS X 10.6.8, which may be the last major update to the operating system before version 10.7 “Lion” arrives next month.
Apple closed security holes in QuickTime, MobileMe, the MySQL implementation in OS X Server and AppStore in Security Update 2011-004, the company said in its support document 24 June.
In Mac OS X 10.6.8 (for Snow Leopard) Apple patched three bugs in the operating system and improved protection against MacDefender fake antivirus scams and related Trojans, according to Apple’s KnowledgeBase article.
The OS X 10.6.8 update also has improved IPv6 and VPN support as well as implemented enhancements to the Mac App Store to “prepare” the Mac for the upgrade to the new Lion operating system, OS X 10.7, expected in July.
The 2011-004 update includes all the Snow Leopard bug fixes as well improvements in AirPort network security, issues handling maliciously crafted files in ColorSync, CoreGraphics and Apple Type Services (ATS) and a Windows ID flaw in the Samba file-sharing protocol. All of these vulnerabilities, if exploited, would have allowed the attacker run arbitrary code on the targeted Mac.
Apple also addressed a serious vulnerability in OS X’s certificate trust policy, which governs how the Mac handles digital certificates. The vulnerability could be exploited by an attacker already in the network to eavesdrop and intercept user credentials and other sensitive data. The certificate trust policy flaw was identified and reported by two Google researchers.
The issue exists if an Extended Validation certificate didn’t have an address to check its validity using the Online Certificate Status Protocol (OCSP). Even if the option to verify all certificates against the certificate revocation list (CRL) was selected, the error handling issue meant the list would not be checked and revoked certificates would be accepted as valid.
“This issue is mitigated as most EV certificates specify an OCSP URL,” Apple said in its advisory.
Apple fixed five vulnerabilities in QuickTime, the default media player widely used on the web. All the bugs could have been exploited by a remote attacker to run arbitrary code. Apple also addressed eight different remote code execution flaws in the MySQL implementation that ships with OS X Server. There were five issues with Apple’s OpenSSL implementation, some of which were also remote code execution bugs, as well.
The way embedded TrueType fonts were being handled in Apple Type Services could cause a heap-based buffer overflow when a document containing a maliciously crafted embedded font was viewed or downloaded, according to Apple’s advisory. The flaw, which could be exploited by an attacker to execute arbitrary code, was reported by two researchers from Red Hat Security Response Team.
An AirPort vulnerability in both desktop and server versions of Mac OS X 10.5.8 allowed attackers on the same Wi-Fi network to cause the Mac to do a system reset.
Expansion among chaos. Amazon considering warehouse expansion in US, and already cancelled some Chinese orders
Loose lips sink...your job. Federal communications reportedly being spied upon by Musk's DOGE, using AI…
Apple's share price plummets over 23 percent in recent days, promoting Microsoft as world's most…
Global markets continue to plummet, as Trump tariffs go into force - including a 104…
Discover how businesses can cut through the AI hype, set realistic goals, and achieve real…
British regulator Ofcom announces first investigation under new digital safety laws, into an online suicide…