Mac OS X update fixes over 130 vulnerabilities

Powered by SC Magazine
 

Mac looking more vulnerable over time.

Apple has fixed more than 130 vulnerabilities with a Mac OS X update, many of which could be exploited by hackers if users do not get the latest version of the operating system.

Mac OS X 10.6.5 includes fixes for a wide array of problems, from issues in QuickTime and Image Capture to a large number of vulnerabilities existing in the Flash Player plug-in.

“Multiple issues exist in the Adobe Flash Player plug-in, the most serious of which may lead to arbitrary code execution,” Apple warned in an advisory.

There is also a fix for a memory management issue in the operating system’s kernel, which could allow a local user to cause an unexpected system shutdown, and the update includes MySQL version 5.0.91 that plugs numerous security holes.

“Many of the vulnerabilities could be exploited by malicious hackers to run unauthorised code on your Mac computer, opening you up to the potential of being spied upon, having information stolen, or cyber criminals commandeering your Mac into becoming part of a botnet,” warned Graham Cluley, senior technology consultant at Sophos, in a blog.

“So, don't delay. Investigate rolling this update onto your Apple Macs as soon as possible.”

Mac security flaws have skyrocketed this year, according to figures from Panda Security.

In 2009, 34 vulnerabilities were detected in the Mac OS and so far in 2010 this has risen to over 170, the security firm reported in October.

Many experts have this year challenged the belief that Macs are inherently safe.

This article originally appeared at itpro.co.uk

Copyright © ITPro, Dennis Publishing


Mac OS X update fixes over 130 vulnerabilities
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 319

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 123

Vote