Apple Macbook pro and other wireless fixes



Do you remember the big bruhaha a month or so back about the “apple wireless vulnerability” that everybody picked apart because in the video taped demonstration they used a third party card…. EVEN though the demonstrators stated that the same vulnerability existed in Apple’s own driver some on the internet tore one reporter up over stating that because Apple denied being shown exploit code (slight semantic issue there…) Well… those driver vulnerabilities that must have not existed, were fixed today by Apple. Brian Krebs has the story, as well as incidents.org


What’s really interesting is that several remote code execution vulnerabilites are fixed in this update, but no credit is given to the company that presented the vulnerability, so it’s either “bad blood” over the issue or a matter of pride for Apple since they’ve not admitted the demonstrated vulnerability was actually in their driver. In fact…. according to the Security Fix post they (Apple) say…

“Basically, what happened is SecureWorks approached Apple with a potential flaw that they felt would affect the wireless drivers on Macs, but they didn’t supply us with any information to allow us to identify a specific problem. So we initiated our own internal product audit, and in the course of doing so found these flaws.”

–Update 10/1/06–

This is still an ongoing controversy. There definitely appears to be bad blood, it’ll continue to be interesting to follow this one.

Related Posts

Blog Traffic Exchange Related Posts
  • Intel Proset Wireless update A couple weeks back, there was a pretty important security update for the Intel Proset Wireless driver. The big problem is that the update was a memory hog and caused porblems. Sans has info on the update to the update, also George Ou is encouraging everyone to make sure they've......
  • Another update on the 0day Explorer exploit Well, it looks like quite a bit took place while I was out on the "zero day exploit front". It looks as though there is another update at The Sans Institute. The first thing to notice is that they've raised their alert level to Yellow over the impending active exploitation......
  • Infocon Green and apple updates The Sans institute (incidents.org) has returned to infocon green. Explaining that there are no fundamentally new variations on the exploits that were circulating and the situation is fairly static. (No big moves in infected machines/port scanning activity.) Also, they note that Apple has released several updates. They effect 10.3.9 and......
Blog Traffic Exchange Related Websites
  • News for 3/4/2011 There hasn't been a post for the new month, so I figured I'll start the month off with some updates of what is going on. Today I updated the design of the site, increasing the width of everything by 40px (920px to 960px; following the 960 grid system) to......
  • Determining the Best Age to Start Social Security Many baby boomers are in the home stretch toward retirement and thinking about what will be the best age for them to claim Social Security retirement benefits.  I have already written about this issue from several different angles but I thought it would make sense to pull all of that......
  • Revir Malware for OS X Undergoes Revision Topher Kesslerof CNET wrote an interesting article about the PDF-based malware threat for the Mac OS X.  Apple had released a new security update, updating its malware definition, aimed at protecting Mac users from this threat, but according to Kessler's article, it seems to have been revised. Read more: http://www.itproportal.com/2011/09/27/apple-counters-pdf-trojan-threat-malware-definition-update/#ixzz1ZvQRk8xN......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site