Ok those of you who for whatever reason think you are completely secure using os x.... 
Here's a very real cross platform vulnerability, reported at CERT (the government 
agency)
that applies to os x and other operating systems and browsers.  note that as i've said,
apple was kind enough to release and update that patched this, but just like microsoft,
didn't bother to tell people it was for security but rather said it improved 
performance
etc.  you can't trust ANY of the vendors to notify users of even huge security holes, 
and
this one is a whopper.  it can allow execution of arbitrary code on your machine 
(meaning
the attacker could use it to do basically anything they wanted to, from installing 
spyware
to destroying your data).  It's also a classic type of bug, the dreaded buffer overrun,
and a few other classics that were found at the same time, and it's open source code, 
not
microsoft code, and it's been in use for 9 years, the bug was there for all those 9 
years
most likely and was just never discovered by white hats or bragged about by black hats,
though it's certainly possible real data thieves were using it and just keeping their
mouths shut (only bored kids brag about how they break in, corporate spies etc. just 
use
what they know and keep their mouths shut).  see links below:

<http://www.kb.cert.org/vuls/id/CRDY-636R79> note, "no statement from vendor", the 
usual
response to serious security problems.

< http://www.kb.cert.org/vuls/id/388984>  showing the truly huge number of systems
affected, on many different processors, this is what happens in the real world because
code is ported from one os/machine type to another, not rewritten so the same bugs 
tend to
be in many different systems.

< http://www.us-cert.gov/cas/techalerts/TA04-217A.html>  announcement of the several
vulnerabilities found about the same time, and reported by an individual who could have
just used them to get rich spying on corporations etc.

< http://www.libpng.org/pub/png/libpng.html> the home page for this open source 
project,
notice that they are upfront about the problem!

note also that this isn't the bug i've referred to previously found in all of the bsd
systems, that was another similar bug.  all of the bsd home pages mentioned it and 
offered
fixes immediately, apple has never said anything publicly though a patch issued about 
the
same time probably fixed it.  without some digging on cert your' not likely to know, 
and
it may or may not be on cert.

all together now "All software has security holes.  All software will always have 
security
holes.  All operating systems have security holes.  All operating systems will always 
have
security holes.".

poorly written code like windows and exploiter just tend to have more.  some explorer
security bugs depend on windows, some don't and effect security on other operating
systems.  most vendors are terrible about honestly informing users about new security
problems and patching them.  often security holes don't get patched until publicly
released (or at least released to the public that subscribes to security email list 
etc.).
 CERT doesn't publicly release bug info until there is a patch or for 1 year usually.

only amateur crackers brag about their exploits, real bad guys just use them carefully 
and
are often never caught.  corporate espionage is very profitable, and the internet and
computers are a fine tool for those "professionals".


-- 
President George W. Bush, Vice President Richard B. Cheney, Secretary of Defense 
Donald H. Rumsfeld,
and Attorney General John D. Ashcroft have committed violations and subversions of the 
Constitution
of the United States of America.  <www.VoteToImpeach.org>  They should be charged with
high treason
and imprisoned frankly.  If there is no rule of law there can be no civilization.

-- 
G-List is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com | Refurbished Drives |
 -- We have Apple Refurbished Monitors in stock!  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

G-List list info:       <http://lowendmac.com/lists/g-list.shtml>
  --> AOL users, remove "mailto:";
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/>

Using a Mac? Free email & more at Applelinks! http://www.applelinks.com

Reply via email to