Feeds

Apple security lags (again) with critical Java patches

A month late, an OS short

The essential guide to IT transformation

Comment Apple is once again playing security catch-up to the rest of the computing world, this time with an update for the Leopard version of its Mac operating system that patches critical holes in Java that were fixed on competing systems 29 days ago.

The patch updates Leopard to Java versions 1.6.0_15, 1.5.0_20, and 1.4.2_22, which Java creator Sun Microsystems released on August 5. No doubt, the four-week turn-around time is better than an update from June, when Apple trailed Sun by six months, but it's still problematic.

What's more, according to these specifications Apple posted in June, Tiger - the Mac OS X version that predated Leopard - continues to use Java versions 1.5.0_19 and 1.4.2_21, the same buggy iterations it warns could allow attackers to hijack end-user machines.

"Multiple vulnerabilities exist in Java 1.5.0_19, the most serious of which may allow an untrusted Java applet to obtain elevated privileges," Apple said in Thursday's advisory. "Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user."

The advisory uses the same language to warn about vulnerabilities in Java 1.4.2_21.

It wouldn't be surprising for Apple to issue an update patching vulnerable Tiger machines soon. But a delay is nonetheless problematic in that it's a tacit admission from Apple - a company that repeatedly flogs the security superiority of its products - that an OS it continues to support is susceptible to vulnerabilities even its own engineers say puts its users at considerable peril.

The larger issue is that Apple continues to lag well behind its peers in fixing critical security bugs in a piece of software that runs on a majority of the world's computers and whose mantra is "write once run anywhere."

The Apple marketing machine can say what it wants about the supposed security of its products. And as we pointed out last week, the company has plenty to be proud of in Snow Leopard, its latest and greatest Mac OS. But until the company does a better job of keeping up with the rest of the pack updating OS X Java, Mac users are being needlessly exposed to serious threats. And no advertising campaign can change that. ®

Next gen security for virtualised datacentres

More from The Register

next story
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.