The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Apple Security Announcement 2003-09-22 Mac OS X 10.2.8
Time: 09:53 EST/14:53 GMT | News Source: ActiveMac | Posted By: Byron Hinson

The new Mac OS X 10.2.8 update contains fixes for the following vulnerabilities:

OpenSSH: Mac OS X 10.2.8 contains the patches to address CVE CAN-2003-0693, CAN-2003-0695, and CAN-2003-0682. On Mac OS X versions prior to 10.2.8, the vulnerability is limited to a denial of service from the possibility of causing sshd to crash. Each login session has its own sshd, so established connections are preserved up to the point where system resources are exhausted by an attack.

To deliver the update in a rapid and reliable manner, only the patches for CVE IDs listed above were applied, and not the entire set of patches for OpenSSH 3.7.1. Thus, the OpenSSH version in Mac OS X 10.2.8, as obtained via the "ssh -V" command, is: OpenSSH_3.4p1+CAN-2003-0693, SSH protocols 1.5/2.0, OpenSSL 0x0090609f

Sendmail: Addresses CVE CAN-2003-0694 and CAN-2003-0681 to fix a buffer overflow in address parsing, as well as a potential buffer overflow in ruleset parsing. fb_realpath(): Fixes CAN-2003-0466 which is an off-by-one error in the fb_realpath() function that may allow attackers to execute arbitrary code. arplookup(): Fixes CAN-2003-0804. The arplookup() function caches ARP requests for routes on a local link. On a local subnet only, it is possible for an attacker to send a sufficient number of spoofed ARP requests which will exhaust kernel memory, leading to a denial of service.

Write Comment
Return to News

  Displaying 776 through 780 of 780
Prev | First
  The time now is 3:19:29 PM ET.
Any comment problems? E-mail us
#776 By 4240821 (193.39.208.35) at 1/10/2026 9:14:46 PM
https://www.pillowfort.social/posts/6624208
https://www.pillowfort.social/posts/6623804
https://www.pillowfort.social/posts/6623707
https://www.pillowfort.social/posts/6623323
https://www.pillowfort.social/posts/6623195
https://www.pillowfort.social/posts/6623047
https://www.pillowfort.social/posts/6622950
https://www.pillowfort.social/posts/6622773
https://www.pillowfort.social/posts/6622671
https://www.pillowfort.social/posts/6622537

#777 By 4240821 (82.115.4.230) at 1/12/2026 3:49:19 AM
https://myvidplay.com/d/4h2ew607gr86
https://myvidplay.com/d/8t1fbd748dr5
https://myvidplay.com/d/duatsq1j7xpg
https://myvidplay.com/d/y4sqks3po3i3
https://myvidplay.com/d/ho37ztv0nn2z
https://myvidplay.com/d/i5r6ri8wff9b
https://myvidplay.com/d/ozh1gxg1gqya
https://myvidplay.com/d/rmw8nbptcs14
https://myvidplay.com/d/nzq4p3qdag7o
https://myvidplay.com/d/3cnts8r46h4g

#778 By 4240821 (82.115.4.230) at 1/12/2026 6:48:18 AM
https://myvidplay.com/d/ak2k4xg3wujx
https://myvidplay.com/d/ky1v53lf5dbv
https://myvidplay.com/d/57ical2e664h
https://myvidplay.com/d/gpij9y5dw3m9
https://myvidplay.com/d/yyrju33sm2oh
https://myvidplay.com/d/zb9lwdbu74qb
https://myvidplay.com/d/8g68elmctt1c
https://myvidplay.com/d/6da45nvz89u1
https://myvidplay.com/d/pjmf8hr9lmc6
https://myvidplay.com/d/r8eisqy17tu6

#779 By 4240821 (82.115.4.230) at 1/12/2026 4:27:17 PM
https://myvidplay.com/d/suirk8xtf9se
https://myvidplay.com/d/0glj4zpibmn1
https://myvidplay.com/d/1jg6kc9i7k8j
https://myvidplay.com/d/7mda3ojrp2ry
https://myvidplay.com/d/mlh8bvxdhwhm
https://myvidplay.com/d/x3t7do3qor54
https://myvidplay.com/d/iiahcrkd6o2q
https://myvidplay.com/d/bejzabk6cwvo
https://myvidplay.com/d/57qgbm223o7f
https://myvidplay.com/d/was1x1u2op2l

#780 By 4240821 (82.115.4.230) at 1/13/2026 12:50:11 AM
https://myvidplay.com/d/ne2e95ovlrfe
https://myvidplay.com/d/eekbk2whbkeb
https://myvidplay.com/d/0ejoc4q6znne
https://myvidplay.com/d/vcf63vx0evfr
https://myvidplay.com/d/jz82fejtfejl
https://myvidplay.com/d/ueb3tcwfpjpm
https://myvidplay.com/d/8nztk6hijt63
https://myvidplay.com/d/8147ca4kg7xd
https://myvidplay.com/d/khdoq5nhva6v
https://myvidplay.com/d/yx27wldv4h8q

Write Comment
Return to News
  Displaying 776 through 780 of 780
Prev | First
  The time now is 3:19:29 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *