Feeds

Modest Apple update slices third-party bugs

Dirty dozen vulns pureed

Beginner's guide to SSL certificates

Apple has pushed out a major security update designed to crush a dozen security bugs, some of which present a critical security risk on unpatched systems. Many of the fixes involve flaws in third-party applications bundled with Mac OS X, rather the flaws in the OS itself.

Patches released by Apple on Tuesday address a malware injection risk in the CoreAudio media player, Flash Player plug-in bugs and a similarly critical vulnerability involving Image Raw. The update also tackles a recently discovered OpenSSL renegotiation exploit. Security fixes for CUPS and Image IO make up the remainder of the patch batch.

Andrew Storms, director of security operations for network security firm nCircle, described the size of the update as smaller than usual. The patch batch of six updates tackles 12 vulnerabilities, compared to the 40 odd bugs normally squashed by the fruit-themed consumer tech giant during a security update cycle.

"Most of these updates are connected with third party software. For example, seven of the twelve CVEs are connected with the update for Adobe's flash player plug-in," Storms said. "The remainder of the bugs patched today are the usual file format parsing problems that we've seen a lot of in the past."

An advisory from Apple (here) provides full details of the runners and riders contained in the update batch. Apple - unlike Microsoft, Adobe and Oracle - issues patch batches as and when they are needed rather than on a regular pre-announced monthly or quarterly schedule.

Bi-monthly updates from Apple are about par. Typically these updates are applied in the background and applied painlessly after Mac fans reboot their systems. ®

Remote control for virtualized desktops

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.