[26133] in bugtraq
Re: MacOS X SoftwareUpdate Vulnerability
daemon@ATHENA.MIT.EDU (Corey J. Steele)
Thu Jul 11 20:53:13 2002
From: "Corey J. Steele" <csteele@good-sam.com>
To: Julian Suschlik <julian.suschlik@gmx.net>
Cc: Russell Harding <hardingr@ucsub.colorado.edu>, bugtraq@securityfocus.com
In-Reply-To: <E90015E5-9280-11D6-B733-00039352123C@gmx.net>
Date: 11 Jul 2002 09:31:27 -0500
Message-Id: <1026397888.1594.40.camel@ws47619>
Mime-Version: 1.0
Content-type: multipart/mixed; boundary="=_IS_MIME_Boundary"
--=_IS_MIME_Boundary
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
What about modifying the search order of `lookupd` and telling it to use
/etc/hosts and then using an entry in /etc/hosts to statically identify
swquery.apple.com? Might be a viable work-around?
-C
On Mon, 2002-07-08 at 09:42, Julian Suschlik wrote:
> Hi,
>=20
> Am Sonntag den, 7. Juli 2002, um 06:21, schrieb Russell Harding:
>=20
> > -----------------------------------------------------------------------=
-----
> > MacOS X SoftwareUpdate Vulnerability.
> > -----------------------------------------------------------------------=
-----
> >
> > Date: July 6, 2002
> > Version: MacOS 10.1.X and possibly 10.0.X
> > Problem: MacOS X SoftwareUpdate connects to the SoftwareUpdate Server=
via
> > HTTP with no authentication, leaving it vulnerable to attack=
.
> [...]
> > Solution/Patch/Workaround:
> [...]
>=20
> A possible workaround:
>=20
> System Preferences -> Software Update -> Update Software: [x] Manually
> Don=B4t touch the "Update Now"-Button!
>=20
> Look for updates on http://www.info.apple.com/support/downloads.html
> Use trusted networks or http-to-mail gateway to get the files.
>=20
> HTH,
>=20
> Julian
>=20
--=20
Corey J. Steele, Information Security Analyst
The Evangelical Lutheran Good Samaritan Society
csteele@good-sam.com | http://www.good-sam.com
--=_IS_MIME_Boundary--