Apple patches for DNS flaw

After waiting since the beginning of July, Apple has put out a patch for the DNS cache poisoning flaw discovered by security researcher Dan Kaminsky.

The patch fixes Apple's version of the Berkeley Internet Name Domain (BIND) DNS server in Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.4 and Mac OS X Server v10.5.4.

The Berkeley Internet Name Domain (BIND) server, which provides translation between host names and IP addresses, is distributed with Mac OS X, and is not enabled by default.

According to the statement that accompanied the patch, “A weakness in the DNS protocol may allow remote attackers to perform DNS cache poisoning attacks. As a result, systems that rely on the BIND server for DNS may receive forged information.”

The update implements greater source port randomization to improve the odds against cache poisoning attacks.

Cisco, Microsoft, Sun Microsystems and many Linux versions put out a fix for the flaw on July 8, when it was first disclosed. Apple had taken some heat when it did not release its patch then, too.

Andrew Storms, director of security operations for nCircle, said in a blog post that some of the patches for components in Apple's systems are incomplete.

“For Apple, it matters most that they patch the client libraries since there are so few OS X recursive servers in use,” he wrote in the blog post. “The client libraries on my OS X 10.4.11 system, post patch install, still does not randomize the source port...despite this update, it appears that the client libraries still aren't patched.”

In addition to the DNS fix, Apple shored up some 16 other vulnerabilities in Mac OS X.

 

More in News

Privacy-bolstering "Apps Act" introduced in House

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Microsoft readies permanent fix for Internet Explorer bug used in energy attacks

Microsoft is prepping a whopper of a security update that will close 33 vulnerabilities, likely including an Internet Explorer (IE) flaw that has been used in targeted website attacks against the U.S. government.

Weakness in Adobe ColdFusion allowed court hackers access to 160K SSNs

Up to 160,000 Social Security numbers and one million driver's license numbers may have been accessed by intruders.