Site icon Secplicity – Security Simplified

Apple OS X Patch Corrects Clear Text Password Issue

Severity: High

Summary:

Exposure:

Late Yesterday, Apple released a security update to fix vulnerabilities in all current versions of OS X. The update fixes around 36 (number based on CVE-IDs) security issues in 19  components that ship as part of OS X or OS X Server, including QuickTime, the Kernel, Time Machine, and many others. Some of the corrected vulnerabilities include:

Apple’s alert also describes many other code execution vulnerabilities, as well as some Denial of Service (DoS) flaws, elevation of privilege vulnerabilities, and information disclosure flaws. Components patched by this security update include:

Login Window Bluetooth
curl Directory Service
HFS ImageIO
Kernel libarchive
libsecurity libxml
LoginUIFramework PHP
Quartz Composer Quicktime
Ruby Samba
Security Framework Time Machine
X11

Please refer to Apple’s OS X 10.6.x and 10.7.x alert for more details.

Note: Apple also released a Safari alert and update, which fixes four vulnerabilities in the Mac and Windows version of Apple’s web browser. Attackers could leverage at least one of these flaws in a drive-by download attack. If you use Safari on a Mac or PC, you should update it to version 5.1.7, or let Apple’s automatic updater do it for you.

Solution Path:

Apple has released OS X Security Update 2012-002 and OS X 10.7.4 to fix these security issues. OS X administrators should download, test, and deploy the corresponding update as soon as they can, or let Apple’s automatic Software Update utility do it for you.


Mac or PC Safari users should also update it to version 5.1.7.

For All Users:

These flaws enable many diverse exploitation methods. Some of the exploits are local, meaning that your perimeter firewall never encounters the attack. Therefore, installing these updates is the most secure course of action.

Status:

Apple has released updates to fix these flaws.

References:

This alert was researched and written by Corey Nachreiner, CISSP (@SecAdept).

Exit mobile version