Bugtraq mailing list archives
Re: Mac OS X vulnerabilities
From: "Thor Larholm" <thor () pivx com>
Date: Tue, 28 Oct 2003 11:23:40 -0800
I couldn't find any security contacts on apple.com that didn't look fee-based so I am asking here in response to these latest disclosures of security vulnerabilities in Mac OS X. When most vendors are notified of security vulnerabilities in their products, they produce a patch for the affected versions of the software and distribute it for free. Does Apple plan to distribute a free patch for these security vulnerabilities to Mac OS X 10.2, or will my clients have to spend $129 per workstation (the single user upgrade price) to have their Apple computer stay secure? Regards Thor Larholm PivX Solutions, LLC - Senior Security Researcher http://pivx.com/larholm/ - Get our research, join our mailinglist
----- Original Message ----- From: "@stake Advisories" <advisories () atstake com>
Subject: Mac OS X Long argv[] buffer overflow This is fixed in Mac OS X 10.3
<snip http://www.securityfocus.com/archive/1/342735/2003-10-25/2003-10-31/0>
Mac OS X Systemic Insecure File Permissions This is fixed in Mac OS X 10.3
<snip http://www.securityfocus.com/archive/1/342725/2003-10-25/2003-10-31/0>
Mac OS X Arbitrary File Overwrite via Core Files This is fixed in Mac OS X 10.3
<snip http://www.securityfocus.com/archive/1/342730/2003-10-25/2003-10-31/0>
Current thread:
- Mac OS X Long argv[] buffer overflow @stake Advisories (Oct 28)
- Re: Mac OS X vulnerabilities Thor Larholm (Oct 28)
- Re: Mac OS X vulnerabilities Joshua Levitsky (Oct 29)
- Re: Mac OS X vulnerabilities Radoslav Dejanovic (Oct 30)
- Re: Mac OS X vulnerabilities Mike Stark (Oct 30)
- Re: Mac OS X vulnerabilities Joshua Levitsky (Oct 29)
- Re: Mac OS X vulnerabilities Thor Larholm (Oct 28)