Apple patches 18 Mac vulnerabilities, ships OS X 10.5.8
Fixes flaws in six critical image file bugs hackers could use to snatch Macs
Computerworld - Apple on Wednesday patched 18 vulnerabilities in Mac OS X, including half a dozen that could let hackers hijack machines by duping users into viewing malicious image files on the Web.
Security Update 2009-003, which was distributed along with Mac OS X 10.5.8 for Leopard users and delivered separately to Tiger users, plugged holes in components ranging from ColorSync and Dock to the kernel and MobileMe, Apple's for-pay sync and storage service.
But it was the six vulnerabilities in various image file formats that caught the eye of Andrew Storms, director of security operations at nCircle Network Security.
"The PNG [Portable Network Graphics] bug is the most interesting," said Storms of the half-dozen image file flaws. "It's a pervasive format that's frequently on Web sites," he added, noting that attackers could trigger the bug simply by getting users to visit malicious sites, a common tactic in the Windows hacker world.
"It's easy enough to host one of these malicious files on [a hacker's] Web site," Storms added.
Apple patched four flaws in the ImageIO component of the Mac's operating system related to its handling of OpenEXR images, a format developed by Lucasfilm's Industrial Light and Magic visual effects studio in 1999 and released to open-source four years later. The sixth image vulnerability, also in ImageIO, could be exploited by malformed Canon RAW photographic files.
Today's security release was Apple's smallest this year by vulnerability count. In May, for example, the California-based computer company quashed 67 bugs, while February's security update patched 55.
Storms saw other oddities this time around. "Usually, we see a lot of Safari or WebKit vulnerabilities, or bugs in a lot of third-party components," he said. "Today, we got neither."
Two of the bugs Apple called out in its advisory affect Safari, but the flaws are not actually found in the browser. And with the exception of one vulnerability in the "bzip2" open-source data-compressor, all of today's bugs were within Apple's own code.
Storms also called attention to the MobileMe vulnerability, which, although not serious, could be used by unscrupulous friends or co-workers to access someone's account. "A logic issue exists in the MobileMe preference pane," Apple said in the advisory. "Signing out of the preference pane does not delete all credentials. A person with access to the local user account may continue to access any other system associated with the MobileMe account which had previously been signed in for that local account."
"This one's important only because MobileMe is such a big application for Apple," argued Storms.
More than half of the vulnerabilities -- 10 of the 18 -- were labeled with Apple's "arbitrary code execution" phrase, meaning the flaws are critical and could be exploited to compromise a Mac. Unlike other vendors, such as Microsoft and Oracle, Apple does not assign a threat ranking to the bugs it discloses.
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!