The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Apple releases Security Updates for Panther and Jaguar
Time: 11:01 EST/16:01 GMT | News Source: Apple | Posted By: Byron Hinson

Yesterday Apple released Security Updates for both Panther and Panther Server (OS X 10.3) and Jaguar and Jaguar Server(OS X 10.2). Both are available via Software Update or the Web. (Note that the Jaguar Update requires OS X 10.2.8, which means that if you still haven't updated to OS X 10.2.8, you'll need to do so to take advantage of this Security Update.)

Security Update 2003-11-19 for Panther provides the following updated components:

  • OpenSSLzlib: Fixes CAN-2003-0851. Parsing particular malformed ASN.1 sequences are now handled in a more secure manner.
  • zlib "gzprintf()" function: Addresses CAN-2003-0107. While there were no functions in Mac OS X that used the vulnerable gzprintf() function, the underlying issue in zlib has been fixed to protect any third-party applications that may potentially use this library.

Security Update 2003-11-19 for Jaguar 10.2.8 provides the following updated components:

  • gm4: Fixes CAN-2001-1411. A format string vulnerability in the gm4 utility. No setuid root programs relied on gm4 and this fix is a preventive measure against a possible future exploit.
  • groff: Fixes VU#399883 where the groff component pic contained a format-string vulnerability.
  • Mail w/CRAM-MD5 authentication: Fixes CAN-2003-0881. The Mac OS X Mail application will no longer fall back to plain text login when an account is configured to use MD5 Challenge Response.
  • OpenSSL: Fixes CAN-2003-0851. Parsing particular malformed ASN.1 sequences are now handled in a more secure manner.
  • Personal File Sharing: Fixes CAN-2003-0878. When Personal File Sharing is enabled, the slpd daemon can no longer create a root-owned file in the /tmp directory to gain elevated privileges.
  • QuickTime for Java: Fixes CAN-2003-0871. A potential vulnerability that could allow unauthorized access to a system.
  • zlib "gzprintf()" function: Addresses CAN-2003-0107. While there were no functions in Mac OS X that used the vulnerable gzprintf() function, the underlying issue in zlib has been fixed to protect any third-party applications that may potentially use this library.

It appears as though these two updates fix the issues that generated various security advisories in late October and early November.

Write Comment
Return to News

  Displaying 551 through 555 of 555
Prev | First
  The time now is 8:21:02 PM ET.
Any comment problems? E-mail us
#551 By 4240821 (82.115.4.230) at 7/5/2025 6:55:53 PM
https://nsfw.su/v/edpbtjv0yxgt.php
https://nsfw.su/v/ulac18cug0vv.php
https://lustful.su/v/kc9d9vnx32jy.php
https://sluts.su/v/2l7b8ztkqphp.php
https://sexonly.top/v/8hhgo0g8dxfl.php
https://sexonly.top/v/7bvcr3osxmbp.php
https://sexonly.su/v/di9ae8hltgwk.php
https://lustful.su/v/otcf8hjg7txt.php
https://sexonly.su/v/x4wjvl30jt1w.php
https://sluts.su/v/9vstmtsutbxh.php

#552 By 4240821 (82.115.4.230) at 7/6/2025 9:01:41 AM
https://nsfw.su/v/s45oklctnfxy.php
https://sluts.su/v/b5mub9ww0ny8.php
https://lustful.su/v/8k2inl2jg77c.php
https://sexonly.su/v/we51bdach2zb.php
https://sluts.su/v/gmktgfjae8ch.php
https://lustful.su/v/ium9ebrjo8vm.php
https://lustful.su/v/f4tn68g700bp.php
https://nsfw.su/v/4r0juyac8y0h.php
https://sexonly.top/v/v2uhes51fz8t.php
https://nsfw.su/v/vqjw6dngz2at.php

#553 By 4240821 (82.115.4.230) at 7/8/2025 4:20:49 PM
https://moanio.com/video.php?id=497
https://moanio.com/video.php?id=2518
https://moanio.com/video.php?id=3467
https://moanio.com/video.php?id=2210
https://moanio.com/video.php?id=3205
https://moanio.com/video.php?id=696
https://moanio.com/video.php?id=2467
https://moanio.com/video.php?id=726
https://moanio.com/video.php?id=491
https://moanio.com/video.php?id=2727

#554 By 4240821 (82.115.4.230) at 7/9/2025 2:27:04 PM
https://moanio.com/video.php?id=341
https://moanio.com/video.php?id=330
https://moanio.com/video.php?id=2760
https://moanio.com/video.php?id=2308
https://moanio.com/video.php?id=492
https://moanio.com/video.php?id=3834
https://moanio.com/video.php?id=2233
https://moanio.com/video.php?id=1555
https://moanio.com/video.php?id=2582
https://moanio.com/video.php?id=2172

#555 By 4240821 (82.115.4.230) at 7/10/2025 12:29:31 AM
https://justpaste.me/Z4Hp1
https://justpaste.me/Z5IA1
https://justpaste.me/ZWDu4
https://justpaste.me/ZQMy3
https://justpaste.me/Yqaq5
https://justpaste.me/Z3yW1
https://justpaste.me/Yr3j
https://justpaste.me/Yz6A
https://justpaste.me/Yn4y
https://justpaste.me/Yh15

Write Comment
Return to News
  Displaying 551 through 555 of 555
Prev | First
  The time now is 8:21:02 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *