Apple finally deals with DNS bug
Gets round to patching July's vulnerability.
By Robert McMillan, IDG News Service | Published: 08:28, 16 September 2008
Apple has finally released a security update for its Mac OS X operating system. The patch fixies a critical Internet security flaw that the company had failed to properly fix in late July.
The Mac OS X v. 10.5.5 security update has, fixed security bugs in Apple's software as well as several open-source components that ship with the operating system. In all, more than 25 bugs have been patched.
But the Internet flaw, which has to do with the Domain Name System (DNS), is the most widely publicised issue.
Apple, like many other operating-system vendors, was forced to patch its DNS software after security researcher Dan Kaminsky discovered a fundamental bug in the way this type of software is built.
On 31 July, Apple had attempted to patch the flaw in Mac OS X, but security experts quickly discovered that while Apple's bug fix worked on the server side, it did not fix the issue on the client software.
With yesterday's patch, Apple has fixed a flaw in the Mac OS X Libresolv DNS software that could have allowed attackers to trick victims into visiting malicious Web sites using what's known as a cache poisoning attack, said Andrew Storms, director of security operations with security vendor nCircle.
Libresolv is maintained by the Internet Systems Consortium (ISC). Although ISC had patched Libresolv by the time of Apple's last security update, the company did not include this bug fix in its July security update, Storms said.
After testing the 10.5.5 update Monday, he said that the Mac OS X client is now doing the required address port randomisation that was added in ISC's bug fix. This is needed to make a cache poisoning attack much more difficult to pull off.
Also patched Monday were common Mac OS components such as Finder, Time Machine and the Mac OS kernel, as well as open-source components including Ruby ClamAV and OpenSSH.
At least nine of the patches fix flaws that could possibly be exploited by attackers to run unauthorised software on a victim's computer.