octane
I have issues, OK!
I found this on Mac Slash:
The point here is: "To exploit this vulnerability, an attacker would have to already have a valid logon account on the local system, or the attacker would already have to have access to a valid logon account."
This is a pretty big point. And just like the DHCP vulnerability recently, the same applied to that; you have to be within the network to instigate an attack.
What got overlooked in all the hooha was the the fact the patch Apple cooked up was to fix a flaw with the DHCP standard itself and _not_ Apple's implementation of it.
The fact of the matter is, if you have username & password access to a mac and you wanted to do damage, why the hell would you fart-arse around with some swap file? As a security flaw, this is not blowing wind up my skirt.
Contrast this with Windows security. Two words: Night & Day...
Anonymous Coward writes "Well, Microsoft managed to expose a vulnerability in OS X by way of their VPC product. Details found here." From their security warning: "A security vulnerability exists in Microsoft Virtual PC for Mac. The vulnerability exists because of the method by which Virtual PC for Mac creates a temporary file when you run Virtual PC for Mac. An attacker could exploit this vulnerability by inserting malicious code into the file which could cause the code to be run with system privileges. This could give the attacker complete control over the system. To exploit this vulnerability, an attacker would have to already have a valid logon account on the local system, or the attacker would already have to have access to a valid logon account." Updates are available to fix this hole and should be installed post haste.
The point here is: "To exploit this vulnerability, an attacker would have to already have a valid logon account on the local system, or the attacker would already have to have access to a valid logon account."
This is a pretty big point. And just like the DHCP vulnerability recently, the same applied to that; you have to be within the network to instigate an attack.
What got overlooked in all the hooha was the the fact the patch Apple cooked up was to fix a flaw with the DHCP standard itself and _not_ Apple's implementation of it.
The fact of the matter is, if you have username & password access to a mac and you wanted to do damage, why the hell would you fart-arse around with some swap file? As a security flaw, this is not blowing wind up my skirt.
Contrast this with Windows security. Two words: Night & Day...