Apple has released its first security patch of the year and it is a big one, designed to tackle a slew of security issues in its OS X operating system.
Most of the fixes aim to prevent potential drive-by-attacks and to fix issues in third-party products.
The OS X Security Updates cover Snow Leopard (OS X 10.6) and Lion (OS X 10.7), according to the support article released by Apple 1 February.
Unlike major vendors such as Microsoft, Oracle and Adobe, Apple does not release security updates on a regular schedule. The last security update was released in June 2011, just before the company launched Lion.
“This sounds like the sort of update you would ignore at your peril,” Paul Ducklin, head of technology in the Asia Pacific group at Sophos, wrote on the Naked Security blog.
Apple classified 19 of the fixes as allowing “arbitrary code execution.” Ducklin said those issues could have been exploited as part of a drive-by attack. Simply using the malicious file could have triggered the attack, such as previewing a font, listening to an audio file, watching a video, viewing an image or reading a PDF document, according to Ducklin. A wide range of file types were affected.
Data files aren’t supposed to contain harmless executable code, so users “reasonably” treat images, podcasts and videos as implicitly safe for both Macs and PCs, Ducklin said. This is one of the reasons why cyber-crooks are willing to pay for these exploits as it allows them to sneak malicious code onto victim computers using innocent-looking files, he said.
Since Apple tightly integrates third-party products into its operating system, it is responsible for patching all those products in addition to closing security flaws in its own tools. This causes it to be slightly behind the curve for some of those issues.
“Multiple vulnerabilities” in Apache were fixed and both desktop and server versions of Snow Leopard and Lion are now running Apache version 2.2.21. The most serious issue, CVE 2011 3348, may cause a denial of service, according to the advisory. A remote attacker could send malformed HTTP requests and cause the server to lock up, resulting in a temporary denial of service condition.
The issue was publicised and patched by Apache back in September. Oracle patched it in its affected products in November. Apple took a little over four months.
Apple also fixed the SSL vulnerability in Apache that could have been exploited by the “BEAST” attack tool. The widespread issue revolved around how data was encrypted using CBC mode. But the flaw could also be used for man-in-the-middle attacks where the data could be decrypted. Apache, Microsoft and Oracle have already patched the flaw in their products.
Apple fixed a “downgrade issue” in which Address Book attempted to establish an unencrypted connection if it was unable to create an encrypted one. An attacker in a “privileged network position” would be able to intercept CardDAV data being sent by Address Book. The issue affected only Lion users and has been fixed to require user approval to create an unencrypted connection.
Apple also revoked the certificates issued by DigiCert Malaysia. Last fall, there were reports that DigiCert Malaysia had issued certificates with weak keys that it was unable to revoke. An attacker would have been able to intercept sensitive information intended for a site with a certificate signed by DigiCert Malaysia.
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…