[26080] in bugtraq

home help back first fref pref prev next nref lref last post

Re: MacOS X SoftwareUpdate Vulnerability

daemon@ATHENA.MIT.EDU (Julian Suschlik)
Mon Jul 8 11:19:57 2002

Date: Mon, 8 Jul 2002 16:42:21 +0200
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Mime-Version: 1.0 (Apple Message framework v482)
Cc: bugtraq@securityfocus.com
To: Russell Harding <hardingr@ucsub.colorado.edu>
From: Julian Suschlik <julian.suschlik@gmx.net>
In-Reply-To: <Pine.GSO.4.40.0207062216280.15196-100000@ucsub.colorado.edu>
Message-Id: <E90015E5-9280-11D6-B733-00039352123C@gmx.net>
Content-Transfer-Encoding: 8bit

Hi,

Am Sonntag den, 7. Juli 2002, um 06:21, schrieb Russell Harding:

> ----------------------------------------------------------------------------
>                     MacOS X SoftwareUpdate Vulnerability.
> ----------------------------------------------------------------------------
>
> Date:      July 6, 2002
> Version:   MacOS 10.1.X and possibly 10.0.X
> Problem:   MacOS X SoftwareUpdate connects to the SoftwareUpdate Server via
>            HTTP with no authentication, leaving it vulnerable to attack.
[...]
> Solution/Patch/Workaround:
[...]

A possible workaround:

System Preferences -> Software Update -> Update Software: [x] Manually
Donīt touch the "Update Now"-Button!

Look for updates on http://www.info.apple.com/support/downloads.html
Use trusted networks or http-to-mail gateway to get the files.

HTH,

Julian


home help back first fref pref prev next nref lref last post