[32257] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Mac OS X vulnerabilities

daemon@ATHENA.MIT.EDU (Adam Shostack)
Fri Oct 31 16:23:01 2003

Date: Fri, 31 Oct 2003 12:46:56 -0500
From: Adam Shostack <adam@homeport.org>
To: James Kelly <macubergeek@comcast.net>
Cc: bugtraq@securityfocus.com
Message-ID: <20031031174656.GA33761@lightship.internal.homeport.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <3C1C830E-0A74-11D8-A7DC-000393790D08@comcast.net>

You're commenting on 1 of 14 issues listed in
http://docs.info.apple.com/article.html?artnum=61798

I am perfectly capable of reading the CVE entries, and deciding, issue
by issue, if it's worth fixing, and if so, how to fix it.  However,
being a security expert should not be a requirement for using a
commericial OS.  If these issues are worthy of fixing, they should be
fixed in 10.2.8.

Adam

On Wed, Oct 29, 2003 at 07:58:54PM -0500, James Kelly wrote:
| This vulnerability is much ado about nothing
| It was caused by developers of shareware using third party installers 
| which changed the permissions on certain
| directories of MacOS X.
| 
| Problem largely solved with the increased use of Apple's installer
| 
| AND
| 
| problem is easily fixed by adding this command to a root cron job.
| 
| diskutil repairpermissions /
| 
| Above command can be run every day for your paranoia protection ;-)
| 
| 
| jamesk
| 

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume



home help back first fref pref prev next nref lref last post