Feeds

Apple OS X update puts elderly Flash out of its misery

Security fixes include new Safari that executes old plugins

Top 5 reasons to deploy VMware with Tegile

Apple has pushed out a slew of security updates for Macs running Snow Leopard (OS X 10.6) and Lion (OS X 10.7).

The operating system upgrades tackle various bugs that leak sensitive information, elevate a user's privileges and, most seriously, allow malicious code to be injected remotely and executed.

The 10.7.4 update grapples with a flaw in FileVault which causes users file encryption passwords to be stored in a log file in plain text. Apple's Remote Desktop client is also updated in 10.7.4 but isn't included in the update pack for Snow Leopard.

Mac OS X 10.7.4 fixes more than 30 vulnerabilities in the core OS, including Apple applications such as Quicktime, and some bundled software packages such as Samba, Ruby and PHP. A similar update for Snow Leopard 10.6.8 is available as Security Update 2012-0002.

Apple's explanation of the security components on both its Mac OS X updates can be found here. Each update requires a system restart to take effect, as is the norm.

The updates also bring in a new build of the Safari web browser. The latest version, 5.1.7, includes a feature that automatically disables the Adobe Flash browser plugin when it gets out of date and prompts users to install the latest version. This is to stop outbreaks of viruses that exploit security holes in old Adobe software.

Apple recently automatically switched off elderly Java installations in an OS update after hundreds of thousands of Macs were infected by the Flashback Trojan.

The update was broadly welcomed by security experts including Wolfgang Kandek, CTO at Qualys here, and Paul Ducklin of Sophos here.

The desktop update follows hot on the heels of Apple's update for smartphones and tablets – iOS 5.1.1 – which was released earlier this week; that update addressed three vulnerabilities with updates to Safari and WebKit. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.