Apple patches 802.11n Airports

By
Follow google news

Security fix covers two holes in base station's software.

Apple patches 802.11n Airports
A new security update from Apple addresses two flaws in the company's Airport Extreme wireless hubs.

The patch only affects the latest 802.11n base stations. 802.11n-equipped notebooks, desktops, and earlier model Airport base stations are not affected.

The more serious of the two vulnerabilities could allow a hacker to access a network and carry out remote attacks. By default, some systems were not configured to block incoming IPv6 traffic, allowing for unsolicited connections to be made without the user's knowledge.

The second of the two vulnerabilities lies within the Airport disk component. This allows for a USB storage device to be connected to the base station and added to the wireless network. If exploited, the vulnerability could allow an attacker to view filenames on the USB disk. The attacker would not, however, be able to open any files or applications.

Macintosh wireless networking components has been the subject of several vulnerability reports in recent months. Last August, a pair of researchers on a MacBook Pro using a 3rd-party networking card.

In November, security researcher HD Moore www.vnunet.com that targeted older Macs. Apple patched Airport-specific vulnerabilities in www.vnunet.com and www.vnunet.com.

The latest Airport update can be downloaded from Apple's support site.
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:

Most Read Articles

Commercial spyware targeted Samsung Galaxy users for months

Commercial spyware targeted Samsung Galaxy users for months

Australia's AUKUS base to connect to subsea cables

Australia's AUKUS base to connect to subsea cables

Westpac factors post-quantum cryptography prep into "secure router" rollout

Westpac factors post-quantum cryptography prep into "secure router" rollout

The BoM has finally tamed SSL

The BoM has finally tamed SSL

Log In

  |  Forgot your password?