Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Apple posts second Mac OS X vuln patch

Nabbed


Update Apple has posted a second software update intended to fix a vulnerability that exploits the way Mac OS X handles URI links.

We installed the update, Security Update 2004-06-07, on a Mac OS X 10.3.4 machine. After restarting the machine, we went straight to Unsanity's web site, the location of a pair of web pages that test the URI vulnerability. Neither tests was blocked by the update, details of which can be found here.

The same site provides Paranoid Android, a utility that halts attempts to open apps from URIs and offers the user the choice of proceeding with the attempt or to cancel it.

Security Update 2004-06-07 does the same thin. We initially downloaded the update using Mac OS X's Software Update facility and we tried again using the download posted on Apple's web site.

Unlike Paranoid Android, the code contained in the update remembers applications the user has permitted other applications to open, or those that the user has opened themselves. So it's possible that the system is allowing access to the test site apps because they have already been run prior to the installation of the update.

Certainly a number of Register readers have told us the update works for them with both Unsanity tests.

We'd certainly recommend installing the new update in any case. ®

Related stories

Mac OS X update fails to fix vulnerability
Apple posts Mac OS X update
Apple patches critical Mac OS X hole
Apple picks 15 June for iTunes launch?
Apple stamps on next-gen Power Mac pics
Apple to slow annual OS X update rate


Other stories you might like

Biting the hand that feeds IT © 1998–2022