Patch/Configuration Management, Vulnerability Management

Apple patches for DNS flaw

After waiting since the beginning of July, Apple has put out a patch for the DNS cache poisoning flaw discovered by security researcher Dan Kaminsky.

The patch fixes Apple's version of the Berkeley Internet Name Domain (BIND) DNS server in Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.4 and Mac OS X Server v10.5.4.

The Berkeley Internet Name Domain (BIND) server, which provides translation between host names and IP addresses, is distributed with Mac OS X, and is not enabled by default.

According to the statement that accompanied the patch, “A weakness in the DNS protocol may allow remote attackers to perform DNS cache poisoning attacks. As a result, systems that rely on the BIND server for DNS may receive forged information.”

The update implements greater source port randomization to improve the odds against cache poisoning attacks.

Cisco, Microsoft, Sun Microsystems and many Linux versions put out a fix for the flaw on July 8, when it was first disclosed. Apple had taken some heat when it did not release its patch then, too.

Andrew Storms, director of security operations for nCircle, said in a blog post that some of the patches for components in Apple's systems are incomplete.

“For Apple, it matters most that they patch the client libraries since there are so few OS X recursive servers in use,” he wrote in the blog post. “The client libraries on my OS X 10.4.11 system, post patch install, still does not randomize the source port...despite this update, it appears that the client libraries still aren't patched.”

In addition to the DNS fix, Apple shored up some 16 other vulnerabilities in Mac OS X.

 

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.