MAAS History
Archives

Entries by drStrangeP0rk (171)

Monday
Aug312009

Snow Leopard Installs Flash 10.0.23.1, Users Have to Reinstall 10.0.32.18

Users that upgrade to Snow Leopard in production systems should visit Adobe's download page for Flash and download the latest version 10.0.32.18. The older version can be exploited by various Flash exploits. Users should also check their Flash Privacy Settings using the Settings Manager. These settings should be set for maximum privacy. 

Users can check their version of Flash here http://kb2.adobe.com/cps/155/tn_15507.html

Related postings on magmatic.com

http://www.magmatic.com/currents/2009/7/24/flash-vulnerability-can-be-contained-in-web-page-air-applica.html

http://www.magmatic.com/currents/2009/1/5/private-browsing-is-not-always-private.html

Thursday
Aug272009

Fake Snow Leopard Sites Spreading OSX_JAHLAV.K Trojan

It is being reported that fake Snow Leopard sites are spreading the OSX_JAHLAV.K Trojan. This Trojan has been evolving and performing different levels of havoc, the current manifestation is changing DNS entries which redirect users to malicious sites. From here users may experience phishing and be directed to download FAKEAV which is malicious anti-virus software. 

Users should not expect to download free copies of OSX or any software for that matter that is a commercial product. Many cracked software has malicious code and should not be trusted. If you suspect that you may have been infected users should review http://www.magmatic.com/currents/2009/6/23/trojan-jahkav-c-more-to-come.html including the follow-up postings. 

Tuesday
Aug252009

Apple Will Release OSX 10.6, aka Snow Leopard, This Friday

The release of OSX 10.6 includes various refinements and security benefits including 64-bit code for the Finder and other common applications. Sandboxing, library randomization and protection of memory are all standard under the 64-bit schema and are implemented with no effort by the average user. 64-bit applications use enhanced checksums, secure argument passing and hardware-based execute disable for heap memory making it much more difficult for attackers to use exploits which are triggered by memory corruption .  

Friday
Aug212009

Update of Apple Remote Desktop Client and Admin Released

Apple has released updates to Apple Remote Desktop Client and Admin with various improvements to control and security. It is recommended that you update the Administration computers then the clients but we have not seen any compatibility issues in mixed environments. (Updated and Non-Updated Clients) This update does not requirer a reboot.

Improvements Directly from HT3301

  • Improves support for accessing client computers and task servers behind NAT (Network Address Translation) routers.
  • Includes Task Server and Directory Server scanners, for finding client computers known by your task server and clients in computer groups on a directory server.
  • New "Reporting" tab in client computer Info window, to set a single reporting policy for the client computer, shared by all Remote Desktop administrator computers.
  • New "Administrators" tab in client computer Info window, to display and control which admin computers and task servers are associated with each client computer.
  • Client settings configurable by Managed Preferences in Workgroup Manager.
  • Support for finding and adding client computers via wide-area Bonjour.
  • Resolves an issue using Lock Screen or Curtain mode on a client computer that's at the login window.
  • Improves stability when running Remote Desktop Admin on a Task Server.
  • Resolves an issue that could cause build_hd_index files to become very large.
  • Improves compatibility with the Application Firewall.
  • Change Client Settings task now works when the Remote Desktop administrator has an Active Directory account.
  • Improves client stability when Sharing Screen.
  • Scheduled UNIX Commands stay scheduled.
  • When controlling a remote client, function keys and key combinations for actions such as Force Quit, Log Out, and the Application Switcher are now all sent to the remote computer.
  • Improves screen sharing performance with RealVNC.
  • Improves performance of encrypted file copies.
  • Improves performance of encrypted screen sharing connections

 

 

Wednesday
Aug122009

Apple Security Update Fixes BIND Update Triggered Assertion Flaw

Apple has released a security update for Mac OSX and MacOSX server that fixes a logic issue related to the dynamic DNS update message. The flaw allowed allow an assertion to be tiggered resulting in the BIND service to be disrupted. All masters servers of zones could be exploited in this manner no matter if they accepted updates by a maliciously crafted update. The update is aviable via Softwre update or via http://support.apple.com/downloads/ and is recomended to be installed right away.