MAAS History
Archives
Thursday
May062010

Opera Releases 10.53 

Opera update 10.53 addresses vulnerability which is triggered by multiple asynchronous calls to a script that modifies document contents. This results in a references to un-initialized value, thus causing a crash and allowing for arbitrary or malicious code execution. Users should perform the update via the Opera Software Updater or download dirrectly from http://www.opera.com/browser/

Friday
Apr302010

Security issues in Adobe Photoshop CS4 11.0.0

Adobe has released update CS4 11.0.1 to address CVE-2010-1279 in Photoshop CS4 11.0.0. A vulnerability exist in which a malformed .TIFF that is opened in Photoshop CS4 can result in denial of service, application crash or arbitrary code execution. Users should apply this update since it is tagged as critical. 

http://www.adobe.com/support/downloads/detail.jsp?ftpID=4291

Thursday
Apr292010

iTunes 9.1.1 Released

Apple has released an update to iTunes that includes support for the iPad. In addition various stability and usability issues related to VoiceOver and Genius have been included. One big issue that has been address is when converting songs to 128 kbps AAC while syncing you iPhone, iPod or iPad. 

Users can install this update via Software Update or downloading from this link.

Currently PC users have been targets of various phishing emails related to the iPad. Due to recent activity in known criminal malware news groups MacOS users should expect that cyber criminals may target them using a similar approach related to the iPad. There goal is to install malware, lock out users or install ransom ware. Apple does not email out software updates ever. Users can visit Apple's download page or use Software Update to obtain updates. Users should also check the hashes related to the down loads if downloading and installing manually. 

Wednesday
Apr142010

Apple Updates Server Admin Tool 10.6.3

Apple has released server admin tools with various updates including the following:

Server Admin

  • Eliminates delays in Server Admin on an IPv6 network.
  • The "Edit Over Quota Error Message" button is now always enabled for the Mail service.
  • You can now stop the NetBoot service without stopping the DHCP service first.
  • NetBoot/NetInstall filtering by client MAC address now works.
  • Adds NetBoot/NetInstall model filter for iMac (27-inch, Late 2009) computers.


System Image Utility

  • Fixes an issue that could generate the message "Catalog file is too fragmented for restore" when creating a NetRestore image from a volume.
  • When using the Add Packages and Post-Install Scripts task, you can now specify the order of the added packages and scripts.
  • You can now create a NetRestore image that includes a package such as iTunes, which would previously prevent the new disk image from being unmounted during creation.
  • The Customize Package Selection workflow now works when the primary language is not English.
  • Adds model filter for iMac (27-inch, Late 2009) computers.
  • Improves the ability to add Software Update and other installation packages to a NetInstall workflow. (* see note below)
  • You can now Enable Automated Installation for a NetRestore image. (* see note below)
  • Fixes an issue that could cause systems created from a NetInstall image to show an alert that "the client computer already exists" when binding to an Open Directory server. For details, see this article. (* see note below)
  • Fixes an issue with setting a custom system name using the Apply System Configuration Settings task. (* see note below)
  • When you Enable Automated Installation for a NetInstall image, clients can now successfully choose which volume to install on, if the "Volume: Selected by user" option is set. (* see note below)

* Note: In order to take advantage of these improvements, you must create an image from a 10.6.3 or later source volume.


Workgroup Manager

  • Fixes an issue that could cause a user's primary shortname to be changed when adding or editing additional shortnames.


Server Admin Tools 10.6.3 also includes these improvements, first delivered in Server Admin Tools 10.6.2:

Server Admin

  • Improves stability of Server Admin application.
  • Includes Netboot/Netinstall model filters for Macs introduced in October, 2009.
  • DHCP service status is now reported correctly when viewing the Netboot service overview.
  • Fixes an issue that could cause a cache file to grow out of bounds when Server Admin checks for server software updates from behind an authenticated web proxy.

Server Assistant

  • Now enforces LOM password length requirements during setup (at least eight characters, no more than twenty).

Server Preferences

  • Improves general usability and reliability of Server Preferences, including the creation and deletion of users and groups.
  • Guest access for File Sharing is now correctly granted when enabled in Server Preferences.

System Image Utility

  • Includes Netboot/Netinstall model filters for Macs introduced in October, 2009.

Workgroup Manager

  • Fixes a user interface issue in Mac OS X Server v10.6.1 that prevented the creation of users with a period "." in the short name on a Snow Leopard Server.
  • Fixes a user interface issue in Mac OS X Server v10.6.1 that could cause incorrect options to appear when creating users on a Snow Leopard Server.

Xgrid Admin

  • Allows one to connect to Mac OS X Server v10.5 Leopard Xgrid controllers.
Wednesday
Apr142010

APPLE-SA-2010-04-14-1 Security Update 2010-003  

Apple has released a security update for Mac OSX 10.6.x client/server and an update for Mac OSX 10.5.x  client/server to address the unchecked issue in Apple Type Services (ATS) discovered by Charlie Miller. Due to uncheck indexing within ATS maliciously crafted embedded fonts will result in application failure and arbitrary code execution. ATS is a legacy framework, currently CoreText is used for Unicode. ATS is prone to various memory-corruption issues as well and is used across various applications so users need to perform this update, Apple recommends developers use Core Text and Core Graphics. It is safe to say that based on the information provided that someone with malicious intent can produce this exploit.

http://developer.apple.com/mac/library/documentation/Carbon/Conceptual/Carbon64BitGuide/OtherAPIChanges/OtherAPIChanges.html

http://support.apple.com/downloads/