Apple Security Patch No Cure All, Secunia Says
TMO Reports - Apple Security Patch No Cure All, Secunia Says
by , 4:45 PM EDT, May 24th, 2004
"It is still possible to execute arbitrary code on a vulnerable user's system, just as easy as before Apple issued Friday's security update for Mac OS X," Niels Henrik Rasmussen, CEO of Secunia, said in an e-mail to The Mac Observer.
Apple released a patch late Friday that fixed a hole in HelpViewer, preventing it from using scripts unless they are written by HelpViewer. The vulnerability made it possible to place arbitrary files, including script files, on a user's Mac if a browser had been configured to open files that appeared 'safe'.
Mr. Rasmussen said many problems still remain, however.
"What is really critical is the fact that Apple did not address the "disk" URI vulnerability, which allows malicious Web sites to silently place code on a user's system," said Mr. Rasmussen. "Everything should be OK, after the "help" vulnerability has been fixed, but another very unfortunate feature has been revealed in Mac OS X disk image and volume handling, allowing a disk image to register a new URI handler and associate an application with this - obviously this application can be located on the disk image or volume."
The result of this exploit, according to Secunia, is that malicious Web sites can exploit the "disk" vulnerability in the same way as the "help" URI handler, "still leaving all Mac OS X systems wide open for attacks," he said. "In other words, Mac users are as vulnerable now, as before the patch was released."
Secunia chastised Apple on two others fronts, saying the company has ignored the security breaches it addressed last Friday since February and that Apple isn't explaining to users through its updates just what the problem is and how serious it could be.
"Unfortunately, Apple once again fails to describe the severity of the issues fixed by the latest security update," said Rasmussen. "Apple states that the update 'Fixes CAN-2004-0486 to ensure that HelpViewer will only process scripts that it initiated.'. This does not clarify how important this update really is. Microsoft and most Linux distributions have learned the lesson and properly describe the nature and the impact of (most) vulnerabilities, allowing their customers to properly estimate the severity of a fixed issue. This is not possible when reading an Apple update." Representatives from Apple were not immediately available to comment for this story.
The description of the update, which is called Security Update 2004-05-24, is sparse on details, merely saying that it updates HelpViewer, one of the weak links in the vulnerability. The update is available via the Software Update control panel of Mac OS X.
- Sun, 12:06 PM
- MGG 624: Sierra, APFS, Wi-Fi and Personal Servers
- Sat, 9:04 PM
- Can't Remotely Control Your HomeKit Devices? Enable iCloud Two-Factor Authentication
- Fri, 9:43 PM
- ScanSnap on Sierra Update: Fujitsu Warns of Data Loss In 'Specific Circumstances'
- Fri, 9:21 PM
- iOS 10: How to Disable (Some) Haptic Feedback on iPhone 7
- Fri, 7:36 PM
- Use the Digital Crown to Control Your Apple Watch Series 2 Screen Brightness
- Fri, 7:03 PM
- Install Secure XFINITY WiFi Profile On Your New iPhone
- Fri, 6:29 PM
- iOS 10: How to Optimize Downloaded Music Storage
- Fri, 6:01 PM
- iOS 10.0.2 Fixes Headphone Audio Controls, More
- Fri, 5:33 PM
- iOS 10: Apps are Gaining 3D Touch Widgets and They're Freakin Sweet
- Fri, 5:33 PM
- Use a Password Manager to Store Your Driver's License and Passport
- Fri, 3:48 PM
- This May be The 4K UHD Apple TV We've Been Waiting For
- Fri, 1:50 PM
- TMO Daily Observations 2016-09-23: Apple, AI, and Buying Tuplejump