Multiple Vulnerabilities in Apple Mac OS X

Every few months, somebody (with a PC) emails me one of notices.
I assume Apple does their security updates othen enough to take care of this. Or am I wrong?
Who makes these notices?
What should I do when I get one of these notices?
Here's THe whole EMAIL:
Multiple Vulnerabilities in Apple Mac OS X
Multiple Vulnerabilities in Apple Mac OS X. The full text of the document is
provided below.
Joint Task Force - Global Network Operations
U N C L A S S I F I E D
Joint Task Force - Global Network Operations (JTF-GNO) Information Assurance
Vulnerability Technical Advisory
Title: Multiple Vulnerabilities in Apple Mac OS X
References:
Security Focus
http://www.securityfocus.com/bid/22948
STIG Finding Severity: Category I
CVE:
CVE-2005-2959
CVE-2006-0225
CVE-2006-0300
CVE-2006-1516
CVE-2006-1517
CVE-2006-2753
CVE-2006-3081
CVE-2006-3469
CVE-2006-4031
CVE-2006-4226
CVE-2006-4829
CVE-2006-4924
CVE-2006-5051
CVE-2006-5052
CVE-2006-5330
CVE-2006-5679
CVE-2006-5836
CVE-2006-6061
CVE-2006-6062
CVE-2006-6097
CVE-2006-6129
CVE-2006-6130
CVE-2006-6173
CVE-2007-0229
CVE-2007-0236
CVE-2007-0267
CVE-2007-0299
CVE-2007-0318
CVE-2007-0463
CVE-2007-0467
CVE-2007-0588
CVE-2007-0719
CVE-2007-0720
CVE-2007-0721
CVE-2007-0722
CVE-2007-0723
CVE-2007-0724
CVE-2007-0728
CVE-2007-0726
CVE-2007-0730
CVE-2007-0731
CVE-2007-0733
CVE-2007-1071
Executive Summary:
There are multiple vulnerabilities affecting Apple Mac Operating System
(OS) X and various Apple applications running on Mac OS X. Mac OS X is a
proprietary operating system developed and sold by Apple Computer, Inc.,
that is included with all currently shipped Apple Macintosh computers.
Mac OS X Server is architecturally identical to its desktop counterpart and
usually runs on Apple's line of Macintosh server hardware. It includes
workgroup management and administration software tools that provide
simplified access to key network services, including a mail server, a
directory server, and a domain name server. Apple Mac OS X is Apple's latest
OS software architecture. These vulnerabilities exist due to unchecked
buffers, error conditions, and incorrect security settings in the software.
Successful exploitation of these vulnerabilities may allow a remote attacker
to execute arbitrary code, access or modify arbitrary data, escalation of
privileges or cause denial of service conditions.
Technical Overview:
There are thirty vulnerabilities affecting Apple Mac Operating System OS X
and various Apple applications running on Mac OS X addressed in this latest
release. An attacker could exploit these vulnerabilities by enticing a user
to use a maliciously crafted website, image, program, or code; or by making
use of known implementation flaws. Results of an attacker exploiting any of
these vulnerabilities include the execution of arbitrary code, triggering a
Denial of Service (DoS), or elevation of user privileges.
The following specific vulnerabilities affecting Apple Mac OS X:
ColorSync Profile Vulnerability - CVE-2007-0719 A stack buffer overflow
exists in the handling of embedded ColorSync profiles. By enticing a user to
open a maliciously-crafted image, an attacker can trigger the overflow,
which may lead to an unexpected application termination or arbitrary code
execution. This update performs additional validation of ColorSync profiles.
Crash Reporter Vulnerability - CVE-2007-0467 Crash Reporter uses an
admin-writable system directory to store logs of processes that have been
unexpectedly terminated. A malicious process running as an admin can cause
these logs to be written to arbitrary files as root, which could result in
the execution of commands with elevated privileges. This update performs
additional validation prior to writing to log files.
CUPS Vulnerability - CVE-2007-0720
A partially-negotiated SSL connection with the CUPS service may prevent
other requests from being served until the connection is closed. Remote
attackers may cause a denial of service during SSL negotiation This update
implements timeouts during SSL negotiation.
Disk Images-Helper Vulnerability - CVE-2007-0721 A memory corruption
vulnerability exists in diskimages-helper. By enticing a user to open a
maliciously-crafted compressed disk image, an attacker could trigger this
issue which may lead to an unexpected application termination or arbitrary
code execution. Mounting a maliciously-crafted disk image may lead to an
unexpected application termination or arbitrary code execution. This update
performs additional validation of disk images.
AppleSingleEnding Disk Images Vulnerability - CVE-2007-0722 An integer
overflow vulnerability exists in the handler for AppleSingleEncoding disk
images. By enticing a local user to open a maliciously-crafted disk image,
an attacker could trigger the overflow which may lead to an unexpected
application termination or arbitrary code execution. Mounting a
maliciously-crafted AppleSingleEncoding disk image may lead to an unexpected
application termination or arbitrary code execution. This update performs
additional validation of AppleSingleEncoding disk images.
Multiple Malicious Disk Image Vulnerabilities - CVE-2006-6061,
CVE-2006-6062, CVE-2006-5679, CVE-2007-0229, CVE-2007-0267,
CVE-2007-0299
Several vulnerabilities exist in the processing of maliciously-crafted disk
images that may lead to an unexpected termination of system operations or
arbitrary code execution. Since a disk image may be automatically mounted
when visiting web sites, this allows a malicious web site to cause a denial
of service. This update performs additional validation of downloaded disk
images prior to mounting them.
Directory Service (DS) Plug-In Vulnerability - CVE-2007-0723 An
implementation flaw in DirectoryService allows an unprivileged LDAP user to
change the local root password. The authentication mechanism in
DirectoryService has been fixed in this release.
Flash Player Vulnerability - CVE-2006-5330 Adobe Flash Player is updated to
version 9.0.28.0 to fix a potential vulnerability that could allow HTTP
request splitting attacks. This is accomplished by playing a
maliciously-crafted Flash content on a vulnerable system. This issue is
described as APSB06-18 on the Adobe web site at
http://www.adobe.com/support/security/
Multiple GNU Tar Vulnerabilities - CVE-2006-0300, CVE-2006-6097 One GNU TAR
vulnerability involves a buffer overflow, which allows user-assisted
attackers to cause a denial of service (application crash) and possibly
execute arbitrary code via unspecified vectors involving PAX extended
headers. The second GNU TAR vulnerability allows user-assisted attackers to
overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES
record with a symbolic link. This record is not properly handled by the
extract_archive function in extract.c and
extract_mangle function in mangle.c.
HFS+ Filesystem Vulnerability - CVE-2007-0318
An HFS+ filesystem in a mounted disk image can be constructed to trigger a
kernel panic (denial of service) when attempting to remove a file from a
mounted filesystem. This update performs additional validation of the
HFS+ filesystem.
IOKit HID Vulnerability - CVE-2007-0724 Insufficient controls in the IOKit
HID interface allow any logged in user to capture console keystrokes,
including passwords and other sensitive information of other users on a
local system. This update limits HID device events to processes belonging to
the current console user.
ImageIO GIF Vulnerability - CVE-2007-1071 An integer overflow vulnerability
exists in the process of handling GIF files. By enticing a user to open a
maliciously-crafted image, an attacker can trigger the overflow which may
lead to an unexpected application termination or arbitrary code execution.
This issue does not affect systems prior to Mac OS X v10.4.
ImageIO Raw Images Vulnerability - CVE-2007-0733 A memory corruption issue
exists in the process of handling RAW images.
By enticing a user to open a maliciously-crafted RAW image, an attacker can
trigger the issue which may lead to an unexpected application termination or
arbitrary code execution. This update performs additional validation of RAW
images. This issue does not affect systems prior to Mac OS X v10.4.
Kernel Vulnerability via fpathconf() System Call - CVE-2006-5836 Malicious
local users may be able to cause a denial of service by using the
fpathconf() system call on certain file types. The result of this action
would be a kernel panic (denial of service). This update improves the
handling for all kernel defined file types.
Kernel Vulnerability via Universal Mach-O Binaries - CVE-2006-6129 An
integer overflow vulnerability exists in the loading of maliciously-crafted
Universal Mach-O binaries. This could allow a malicious local user to cause
a kernel panic, an arbitrary code execution, or the elevation of system
privileges. This update performs additional validation of Universal
binaries.
Kernel Vulnerability via sharedregion_make_privatenp() System Call -
CVE-2006-6173
The sharedregion_make_privatenp() system call allows a maliciously-crafted
program to request a large allocation of kernel memory. This could allow a
malicious local user to cause a system hang.
This issue does not allow an integer overflow to occur, and it cannot lead
to arbitrary code execution. This update incorporates additional validation
of the arguments passed to sharedregion_make_privatenp().
Multiple MySQL Server Vulnerabilities - CVE-2006-1516, CVE-2006-1517,
CVE-2006-2753, CVE-2006-3081, CVE-2006-4031, CVE-2006-4226,
CVE-2006-3469
Multiple vulnerabilities exist in MySQL which could be exploited by
attackers making use of known system flaws via specially crafted codes.
In addition to being able to execute arbitrary code, the attacker could also
exploit these vulnerabilities causing a denial of service or buffer
over-read; obtaining sensitive information; and creating/accessing a
database.
Networking Vulnerability via AppleTalk Protocol Handler - CVE-2006-6130 A
memory corruption issue exists in the AppleTalk protocol handler. This could
allow a malicious local user to cause a kernel panic, or gain system
privileges to execute arbitrary code. This update performs additional
validation of the input data structures.
Networking Vulnerability via AppleTalk Requests - CVE-2007-0236 A heap
buffer overflow vulnerability exists in the AppleTalk protocol handler. By
sending a maliciously-crafted request, a local user can trigger the overflow
which may lead to a denial of service or arbitrary code execution. This
update performs additional validation of the input data.
OpenSSH Keys Vulnerability - CVE-2007-0726 A remote attacker can destroy
established trust between SSH hosts by causing SSH Keys to be regenerated.
SSH keys are created on a server when the first SSH connection is
established. An attacker connecting to the server before SSH has finished
creating the keys could force the keys then to be recreated. This could
result in a denial of service against processes that rely on a trust
relationship with the server.
Systems that already have SSH enabled and have rebooted at least once are
not vulnerable to this issue. This issue is addressed by improving the SSH
key generation process. This issue is specific to the Apple implementation
of OpenSSH.
Multiple OpenSSH Vulnerabilities - CVE-2006-0225, CVE-2006-4924,
CVE-2006-5051, CVE-2006-5052 Multiple vulnerabilities exist in OpenSSH, to
include compilation and faulty authentication errors. An attacker could use
these vulnerabilities in specially crafted codes/commands to cause the
execution of arbitrary code, or a denial of service.
USB Printing Vulnerability - CVE-2007-0728 Insecure file operations may
occur during the initialization of a USB printer. An unprivileged attacker
with system privileges may leverage this issue to create or overwrite
arbitrary files on the system. This update improves the printer
initialization process.
QuickDraw PICT Image Processing Vulnerability - CVE-2007-0588 A heap buffer
overflow vulnerability exists in QuickDraw's PICT image processing. By
enticing a user to open a maliciously-crafted PICT image, an attacker can
trigger the overflow which may lead to an unexpected application termination
or arbitrary code execution. This update performs additional validation of
PICT files.
servermgrd Authentication Credentials Vulnerability - CVE-2007-0730 An issue
in Server Manager's validation of authentication credentials could allow a
remote attacker without valid credentials to alter the system configuration.
This update addresses the issue by additional validation of authentication
credentials.
SMB File Server Vulnerability - CVE-2007-0731 A stack-based buffer overflow
in the Apple-specific Samba module (SMB File Server) allows a user with
write access to an SMB share to execute arbitrary code via a long ACLA file
with an overly-long ACL. This could lead to a denial of service or arbitrary
code execution. This update performs additional validation of ACLs. This
issue does not affect systems prior to Mac OS X v10.4.
Software Update Application Vulnerability - CVE-2007-0463 A format string
vulnerability exists in the Software Update application.
By enticing a user to download and open a maliciously-crafted Software
Update Catalog file, an attacker can trigger the vulnerability which may
lead to an unexpected application termination or arbitrary code execution.
This update removes document bindings for Software Update Catalogs. This
issue does not affect systems prior to Mac OS X v10.4.
sudo Configuration Vulnerability - CVE-2005-2959 A user-modified sudo
configuration could allow environment variables to be passed through to the
program running as a privileged user. If sudo is configured to allow an
otherwise unprivileged user to execute a given bash script with elevated
privileges, the user may be able to execute arbitrary code with elevated
privileges. Systems with the default sudo configuration are not vulnerable
to this issue. This issue has been addressed by updating sudo to 1.6.8p12.
Further information is available via the sudo web site at
http://www.sudo.ws/sudo/current.html
Blojsom WebLog Vulnerability - CVE-2006-4829 A cross-site scripting
vulnerability exists in Blojsom. This allows remote attackers to inject
JavaScript into blog content that will execute in the domain of the Blojsom
server. This update performs additional validation of the user input. This
issue does not affect systems prior to Mac OS X v10.4.
Vulnerable Applications/Systems and Countermeasures:
Vulnerable applications/systems with fixes available:
Compliance is RECOMMENDED. Although this notice is a Technical Advisory,
Systems Administrators should strongly consider implementing these updates.
Apple Mac OS X 10.3.9
Apple Mac OS X 10.4.0
Apple Mac OS X 10.4.1
Apple Mac OS X 10.4.2
Apple Mac OS X 10.4.3
Apple Mac OS X 10.4.4
Apple Mac OS X 10.4.5
Apple Mac OS X 10.4.6
Apple Mac OS X 10.4.7
Apple Mac OS X 10.4.8
Apple Mac OS X Server 10.3.9
Apple Mac OS X Server 10.4.0
Apple Mac OS X Server 10.4.1
Apple Mac OS X Server 10.4.2
Apple Mac OS X Server 10.4.3
Apple Mac OS X Server 10.4.4
Apple Mac OS X Server 10.4.5
Apple Mac OS X Server 10.4.6
Apple Mac OS X Server 10.4.7
Apple Mac OS X Server 10.4.8
Temporary Mitigation Strategies
None
Vulnerable applications/systems with no patches available, vendor temporary
recommended mitigations available:
Permanent fixes are not available. Temporary mitigations have been provided
to protect vulnerable systems until permanent patches are available.
Administrators should consider using the temporary mitigations provided or
develop local strategies to protect vulnerable systems from attack.
None
Vulnerable applications/systems with no patch or temporary recommended
mitigations:
There are no patches or temporary mitigations available. Administrators
should consider developing strategies to protect vulnerable systems based on
local mission requirements and operational impact. As patches or workarounds
become available the status will be upgraded to "Fix available" or
"Mitigation Available".
None
Unsupported Software:
Mac OS X versions prior to 10.3.9

Who's sending you these emails and why? It sounds like a Windows apologist with an inferiority complex trying to make OS X look bad. The facts are that there are no viruses or malware in the wild at this time actively compromising OS X users. Discovered flaws and vulnerabilities do not immediately translate into active malware on OS X like they do on Windows. Apple releases security updates on a regular basis. The recent OS X 10.4.9 update, for example, provided fixes for some 45 known security issues. OS X is by no means a perfect piece of code but you are infinitely safer on the internet using OS X than you are using any version of Windows, including the new Vista.
As to who makes these notices there are security researchers and companies whose job it is to find and report security flaws in any operating system or application they choose to inspect. They provide a valuable service to companies like Apple and Microsoft in helping them close holes in their software.
CVE stands for "Common Vulnerabilities and Exposures" and is a standardized way of cataloging security issues. CVE is supported by CERT (Computer Emergency Response Team) which in turn is supported by the Federal Government and the Department of Homeland Security.
Here is the web site link...
http://cve.mitre.org/about/
The best response when you get one of these emails is to do nothing. Instead, keep your system current and up-to-date with all security updates and OS X updates released by Apple. And above all, don't worry.
Dual 2.5GHz G5 Power Macintosh   Mac OS X (10.4.9)  

Similar Messages

  • Multiple Vulnerabilities in Research in Motion Blackberry - Desktop

     ALCON,
    I am receiving the following Retina Vulnerability, but I don't have any blackberry software installed on any of these systems. These systems have never touched a blackberry, they are all Windows Server 2003 SP2. Anyone else have this false positive appear and know how to resolve it. My report looks like garbage with this nonsense.
    any help is greatly appreciated.
    Description: Multiple vulnerabilities exists within the Blackberry Enterprise Server Router, Blackberry Handheld Browser, and the Blackberry Enterprise Server Attachment Service. These vulnerabilities may allow for an attacker to send specially crafted attachments or files in order to cause a denial of service, cause a heap overflow, or to execute arbitrary code. Please check to make sure your Blackberry Handheld is not vulnerable
    How To Fix: Upgrade to the latest version of the Blackberry product and apply the vendor supplied hotfix. In the case that the issue has no software fix yet, apply the vendor provided workaround.
    Related Links: 392920 (http://www.kb.cert.org/vuls/id/392920) 570768 (http://www.kb.cert.org/vuls/id/570768) 646976 (http://www.kb.cert.org/vuls/id/646976) 829400 (http://www.kb.cert.org/vuls/id/829400) Blackberry - KB-04755 (http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=11677...) Blackberry - KB-04756 (http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/728075/728850/728215/?n...) Blackberry - KB-04757 (http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/728075/728850/728215/?n...) Blackberry - KB-04758 (http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/728075/728850/728215/?n...)
    CVE: CVE-2005-2341 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2341) - Heap-based buffer overflow in Research in Motion (RIM) BlackBerry Attachment Service allows remote attackers to cause a denial of service. CVE-2005-2342 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2342) - Research in Motion (RIM) BlackBerry Router allows remote attackers to cause a denial of service. CVE-2005-2343 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2343) - Research in Motion (RIM) BlackBerry Handheld web browser for BlackBerry Handheld before 4.0.2 allows remote attackers to cause a denial of service. CVE-2005-2344 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2344) - The BlackBerry Attachment Service in Research in Motion (RIM) BlackBerry Enterprise Server (BES) 4.0 to version 4.0 Service Pack 2 allows attackers to cause a denial of service. CCE:
    IAV: 2006-T-0001 (https://www.jtfgno.mil/bulletins/dodcert2006/2006-t-0001.htm) - Multiple Vulnerabilities in Research In Motion (RIM) Blackberry - NAVCIRT: 2006-T-0001
    BugtraqID: 16098 (http://www.securityfocus.com/bid/16098) - Research In Motion Blackberry Enterprise Server is prone to denial of service attacks. 16099 (http://www.securityfocus.com/bid/16099) - Blackberry Handheld devices are prone to a denial of service attack. 16100 (http://www.securityfocus.com/bid/16100) - The Blackberry Enterprise Server Router component is prone to a denial of service vulnerability.

    Who's sending you these emails and why? It sounds like a Windows apologist with an inferiority complex trying to make OS X look bad. The facts are that there are no viruses or malware in the wild at this time actively compromising OS X users. Discovered flaws and vulnerabilities do not immediately translate into active malware on OS X like they do on Windows. Apple releases security updates on a regular basis. The recent OS X 10.4.9 update, for example, provided fixes for some 45 known security issues. OS X is by no means a perfect piece of code but you are infinitely safer on the internet using OS X than you are using any version of Windows, including the new Vista.
    As to who makes these notices there are security researchers and companies whose job it is to find and report security flaws in any operating system or application they choose to inspect. They provide a valuable service to companies like Apple and Microsoft in helping them close holes in their software.
    CVE stands for "Common Vulnerabilities and Exposures" and is a standardized way of cataloging security issues. CVE is supported by CERT (Computer Emergency Response Team) which in turn is supported by the Federal Government and the Department of Homeland Security.
    Here is the web site link...
    http://cve.mitre.org/about/
    The best response when you get one of these emails is to do nothing. Instead, keep your system current and up-to-date with all security updates and OS X updates released by Apple. And above all, don't worry.
    Dual 2.5GHz G5 Power Macintosh   Mac OS X (10.4.9)  

  • Multiple Accounts and Apple ID's

    Hi
    I have an iMac with two accounts on it each account has it's own Apple ID
    When i logon to account A and use itunes i can down load music from it's own Apple ID. When i logon to account B and use itunes i can see the music that has been purchased with it's apple ID but when i goto download it i get the error "This computer is already associated with an Apple ID"
    Is there a away i can use two Apple ID's with two different account on one Mac ?
    Thank you for any help you guys can give me.

    Simple answer: Keep a copy of all your purchases on a local drive even if it an archive drive you don't normally keep plugged in.  Do not put yourself in a position where you have to re-download past purchases.  Many you can re-download multiple times but Apple itself observes they may not always be available for re-download (http://support.apple.com/kb/ht2519).
    iTunes Store: Associating a device or computer to your Apple ID - http://support.apple.com/kb/HT4627 - In connection with, "When you turn on iTunes Match or Automatic Downloads, or when you download past purchases on an iOS device or computer, that device or computer becomes associated with your Apple ID." "Your Apple ID can have up to 10 devices and computers (combined) associated with it. Each computer must also be authorized using the same Apple ID. Once a device or computer is associated with your Apple ID, you cannot associate that device or computer with another Apple ID for 90 days."
    Why all the above?  No official statement but one could forward the argument it's a step to preventing media piracy.

  • HT2542 i do not have "accounts" under the "View" menu?  i want to have multiple iTunes on one mac help please

    i am trying to have multiple users on my mac can you help?

    iTunes: How to share music between different accounts on a single computer
    <http://support.apple.com/kb/HT1203>

  • We are a creative design studio, we need to use apple mac pro server , so we can make more than a different user to use at the same time doing different activities, on different screens, is it possible?what is the max. no. of users that can work efficient

    we are a creative design studio, we need to use apple mac pro server , so we can make more than a different user to use at the same time doing different activities, on different screens, is it possible?what is the max. no. of users that can work efficient.
    Appreciate your support and if possible , how to do this?

    If you want to work with Mac OS X, you need one computer per simultaneous user.
    What you are describing, " Multiple simultaneous logins to a single computer" is not avialable on a regular Mac of any description, unless you decide to use Unix tools instead of Mac OS X.
    Server will happily store files for many, many users and provide them to multiple (up to hundreds) of computers at "near hard Drive" speeds over Gigabit Ethernet. It can make the File Sharing part easy.

  • Cisco wireless and Apple Mac woes

    Hello all,
    I've been working with Cisco wireless and WLC's for a couple of years now but the recent onslaught of Apple Mac's is giving me heart burn.  I've seen this at numerous sites now and need to throw it to eht community for guidance.
    Basically we have had a number of instances where the Macs just fall off the wifi.  Sometimes it's when they wake from sleep and other times when roaming between AP's (1131s with same SSID's).  Our standard install is WPA2 and per ap local authentication.  PC's work fine and never an issue.
    We have completed a survey with a spectrum analyser and no RF interefence is present nor errors on the radio interface.
    Questions:
    - Is there a preferred Cisco config/setup for Mac's to work reliably?  I've heard loads of rumors but nothing concrete and nor can I find anything specific.
    - Should I be setting up WDS in case there is an authenticating issue.
    - For those who are Mac gurus and happen to be reading. What Mac options we should look at?
    This has all come to a head because the clients IT company who recommended the Macs (different from us doing the network infrastructure) are insisting that the problem is Cisco incompatibility and that we should rip out the Cisco kit and install airports (what tha!!!).
    Thanks in advance for any pointers.
    For those who like a config here it is .... Vanilla stuff really
    Building configuration...
    Current configuration : 2236 bytes
    version 12.4
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname AP4
    no logging console
    enable secret xxxxxxxxxxxxxxxxx
    no aaa new-model
    dot11 syslog
    dot11 ssid Home
       vlan 1
       authentication open
       authentication key-management wpa
       guest-mode
       mbssid guest-mode
       wpa-psk ascii xxxxxxxxxxxx
    dot11 ssid avnet
       vlan 2
       authentication open
       authentication key-management wpa
       mbssid guest-mode
       wpa-psk ascii xxxxxxxxxxxxxxxx
    username abcd password 1234
    bridge irb
    interface Dot11Radio0
    no ip address
    no ip route-cache
    encryption vlan 1 mode ciphers tkip
    encryption vlan 2 mode ciphers tkip
    ssid Home
    mbssid
    speed  basic-1.0 basic-2.0 5.5 11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0
    channel 2412
    station-role root
    interface Dot11Radio0.1
    encapsulation dot1Q 1 native
    no ip route-cache
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    bridge-group 1 spanning-disabled
    interface Dot11Radio0.2
    encapsulation dot1Q 2
    no ip route-cache
    bridge-group 2
    bridge-group 2 subscriber-loop-control
    bridge-group 2 block-unknown-source
    no bridge-group 2 source-learning
    no bridge-group 2 unicast-flooding
    bridge-group 2 spanning-disabled
    interface FastEthernet0
    no ip address
    no ip route-cache
    duplex auto
    speed auto
    hold-queue 80 in
    interface FastEthernet0.1
    encapsulation dot1Q 1 native
    no ip route-cache
    bridge-group 1
    no bridge-group 1 source-learning
    bridge-group 1 spanning-disabled
    interface FastEthernet0.2
    encapsulation dot1Q 2
    no ip route-cache
    bridge-group 2
    no bridge-group 2 source-learning
    bridge-group 2 spanning-disabled
    interface BVI1
    ip address 192.168.10.54 255.255.255.0
    no ip route-cache
    ip default-gateway 192.168.10.1
    no ip http server
    no ip http secure-server
    bridge 1 route ip
    line con 0
    line vty 0 4
    login local
    end

    Yeah!! even i have come across multiple issue with MAC and Cisco.. these are the below settings which i normally do on the cisco gears and most of the times this solved the issue..
    on the IOS AP disable Aironet Extentions and set the poer local and ofdm to max
    no dot11 extension aironet
    power local cck max
    power local ofdm max
    end
    On the WLC, disable Aironet IE..
    lemme know if this answered your question..
    Regards
    Surendra
    ====
    Please dont forget to rate the posts which answered your question and mark it as answered or was helpfull

  • How can I buy multiple licenses of Apple software to be insalled in other computeres

    How can I buy multiple licenses of Apple software to be insalled in other computeres?
    I need to buy 20Final Cut,  20 Motion and 20 Compresso

    Not so fast there.
    The requirement of 20 copies sounds like business, not personal use.  The terms and conditions are different for businesses. You cannot buy one copy and have 20 employees (or 20 students if this is for a class being taught) using it on 20 different computers.
    MAC APP STORE PRODUCT USAGE RULES
    Except as otherwise set forth herein,
    If you are an individual acting in your personal capacity, you may download and use an application from the Mac App Store (“Mac App Store Product”) for personal, non-commercial use on any Apple-branded products running Mac OS X (“Mac Computer”) that you own or control.
    (ii) If you are a commercial enterprise or educational institution, you may download a Mac App Store Product for use by either (a) a single individual on each of the Mac Computer(s) used by that individual that you own or control or (b) multiple individuals on a single shared Mac Computer that you own or control. For example, a single employee may use a Mac App Store Product on both the employee’s desktop Mac Computer and laptop Mac Computer, or multiple students may serially use a Mac App Store Product on a single Mac Computer located at a resource center or library. For the sake of clarity, each Mac Computer used serially by multiple users requires a separate license.
    (iii) Use may require sign-in with the Apple ID used to download the Mac App Store Product from the Mac App Store. Mac App Store Products can be updated through the Mac App Store only.

  • Installing icloud on an 2010 Apple Mac

    First of all, be patient with me I am 69 years old. I want to use icloud on my apple mac pro, but it is from 2010. When I look at System preferences, icloud is not shown, only Mobile Me, which is obsolete.  I can't figureout how to sync it with my iPad, which has icloud already up and running. HELP?? Please?

    You must upgrade you computer to 10.7.2 or later. Your computer can be upgraded to Mavericks.
    Upgrading to Snow Leopard
    You can purchase Snow Leopard through the Apple Store: Mac OS X 10.6 Snow Leopard - Apple Store (U.S.). The price is $19.99 plus tax. You will be sent physical media by mail after placing your order.
    After you install Snow Leopard you will have to download and install the Mac OS X 10.6.8 Update Combo v1.1 to update Snow Leopard to 10.6.8 and give you access to the App Store. Access to the App Store enables you to download Mavericks if your computer meets the requirements.
         Snow Leopard General Requirements
           1. Mac computer with an Intel processor
           2. 1GB of memory
           3. 5GB of available disk space
           4. DVD drive for installation
           5. Some features require a compatible Internet service provider;
               fees may apply.
           6. Some features require Apple’s iCloud services; fees and
               terms apply.
    Upgrading to Mavericks
    You can upgrade to Mavericks from Lion or directly from Snow Leopard. Mavericks can be downloaded from the Mac App Store for FREE.
    Upgrading to Mavericks
    To upgrade to Mavericks you must have Snow Leopard 10.6.8 or Lion installed. Download Mavericks from the App Store. Sign in using your Apple ID. Mavericks is free. The file is quite large, over 5 GBs, so allow some time to download. It would be preferable to use Ethernet because it is nearly four times faster than wireless.
        OS X Mavericks- System Requirements
          Macs that can be upgraded to OS X Mavericks
             1. iMac (Mid 2007 or newer) - Model Identifier 7,1 or later
             2. MacBook (Late 2008 Aluminum, or Early 2009 or newer) - Model Identifier 5,1 or later
             3. MacBook Pro (Mid/Late 2007 or newer) - Model Identifier 3,1 or later
             4. MacBook Air (Late 2008 or newer) - Model Identifier 2,1 or later
             5. Mac mini (Early 2009 or newer) - Model Identifier 3,1 or later
             6. Mac Pro (Early 2008 or newer) - Model Identifier 3,1 or later
             7. Xserve (Early 2009) - Model Identifier 3,1 or later
    To find the model identifier open System Profiler in the Utilities folder. It's displayed in the panel on the right.
         Are my applications compatible?
             See App Compatibility Table - RoaringApps.
    You have provided very little information, so I'm going to also suggest considering installing more RAM in your computer:
    Maximum Memory
    8.0 GB
    Memory Slots
    2 - 204-pin PC3-8500 (1066 MHz) DDR3 SO-DIMM
    Before embarking on this trek I also highly recommend that you make a backup of your current system in the event things go wrong, which they can.
    Basic Backup
    For some people Time Machine will be more than adequate. Time Machine is part of OS X. There are two components:
    1. A Time Machine preferences panel as part of System Preferences;
    2. A Time Machine application located in the Applications folder. It is
         used to manage backups and to restore backups. Time Machine
         requires a backup drive that is at least twice the capacity of the
         drive being backed up.
    3. Time Machine requires a backup drive that is at least double the
         capacity of the drive(s) it backs up.
    Alternatively, get an external drive at least equal in size to the internal hard drive and make (and maintain) a bootable clone/backup. You can make a bootable clone using the Restore option of Disk Utility. You can also make and maintain clones with good backup software. My personal recommendations are (order is not significant):
      1. Carbon Copy Cloner
      2. Get Backup
      3. Deja Vu
      4. SuperDuper!
      5. Synk Pro
      6. Tri-Backup
    Visit The XLab FAQs and read the FAQ on backup and restore.  Also read How to Back Up and Restore Your Files. For help with using Time Machine visit Pondini's Time Machine FAQ for help with all things Time Machine.
    Although you can buy a complete external drive system, you can also put one together if you are so inclined.  It's relatively easy and only requires a Phillips head screwdriver (typically.)  You can purchase hard drives separately.  This gives you an opportunity to shop for the best prices on a hard drive of your choice.  Reliable brands include Seagate, Hitachi, Western Digital, Toshiba, and Fujitsu.  You can find reviews and benchmarks on many drives at Storage Review.
    Enclosures for FireWire and USB are readily available.  You can find only FireWire enclosures, only USB enclosures, and enclosures that feature multiple ports.  I would stress getting enclosures that use the Oxford chipsets especially for Firewire drives (911, 921, 922, for example.)  You can find enclosures at places such as;
      1. Cool Drives
      2. OWC
      3. WiebeTech
      4. Firewire Direct
      5. California Drives
      6. NewEgg
    All you need do is remove a case cover, mount the hard drive in the enclosure and connect the cables, then re-attach the case cover.  Usually the only tool required is a small or medium Phillips screwdriver.

  • 2008 Apple Mac Pro with SAPPHIRE TRI-X R9 290 4GB GDDR5 OC (UEFI)

    Dear Apple,
    Can you please add hardware/drivers support for the Sapphire Tri-X R9 290 GDDR5 OC (UEFI) Graphics cards to the latest Mac OS X 10.10 operating system?
    We have a few Apple Mac Pro's that we installed older Radeon 7970 graphics cards in (a few years back) and now we are upgrading the graphics cards to the newest Radeon R9 290 Series cards (Sapphire Tri-X R9 290 4GB GDDR5 OC UEFI).
    We chose the Sapphire Tri-X R9 290 4GB GDDR5 OC (UEFI) (11227-00-40G) Graphics cards.  
    The Sapphire Graphics card can be found here:
    http://www.sapphiretech.com/presentation/product/?cid=1&gid=3&sgid=1227&pid=2091 &psn=&lid=1&leg=0
    We have been trying to figure out how to get this graphics card to work with the latest OS X 10.10 Yosemite.  We are installing two Sapphire R9 290 graphics cards per machine.
    We want to make sure that the OS X drivers support multiple monitors, CrossFire, as well as HDMI audio, and support GPU hardware support in the latest OS X 10.10 Yosemite.
    Has anyone managed to get the Sapphire Tri-X R9 290 (SKU ID: 11227-00-40G) working in a 2008 or 2009 Apple Mac Pro?
    We have 24 Apple Mac Pro's and we purchased 48 of the Sapphire Tri-X R9 290 graphics cards (to install into the Apple Mac Pro's) and we're trying to figure out how to add driver support to OS X for the Sapphire Tri-X R9 290 / Radeon R9 290 to the latest Mac OS X.
    If I go into the "Graphics/Displays" Hardware section it shows that the Sapphire card (in Slot 2) is installed, but it only displays the name "Display".
    The properties of the Sapphire Tri-X R9 290 graphics card are:
      Vendor: ATI (0x1002)
      Device ID: 0x67b1
      Revision ID: 0x0000
      Kernel Extension Info: No Kext Loaded
    Any ideas as to how to install hardware drivers to get these graphics cards to work properly in OS X 10.10 Yosemite and to enable GPU hardware support in OS X and also enable HDMI Audio?

    Over a YEAR has passed, and we still can't get Apple to add the latest hardware drivers for the newest/latest AMD Graphics Cards (AMD R9 290 series).
    We have contacted AMD, and Sapphire, and everyone has pointed their fingers back at Apple, and said that Apple is the only ones that can add the latest graphics drivers to their Apple OS X Operating System.
    So the problem lies on Apple, and Apple refuses to update it's operating system to support the newest/latest hardware.
    AMD pointed us right back to Apple and said that it's Apple's OS X Operating System, and that it's Apple's job to add and write the newest/latest graphics display drivers to their OS X operating system.
    AMD says it's Apple's fault.  Sapphire says it's Apple's fault.  Apple just refuses to do anything, and ultimately it's Apple's operating system and Apple's closed-ended ecosystem that refuses to allow customers/users to upgrade their Apple Mac Pro computers to the newest/latest hardware.
    In the end, I guess the only solution is to abandon Apple Mac Pro products, and just start purchasing "Microsoft Windows PC" computers that we can upgrade and that have PCIe slots that we can just swap out the graphics cards (every year) with the newest/latest graphics card hardware.
    Here:  http://forums.amd.com/game/messageview.cfm?catid=440&threadid=181379
    Here:  https://www.sapphireforum.com/showthread.php?33574-2008-2012-Apple-Mac-Pro-with- SAPPHIRE-TRI-X-R9-290-4GB-GDDR5-OC-(UEFI)&p=277467#post277467
    Apple seems to be a "dead end" and they don't support their high-end customers and don't seem to support Apple Mac Pro (high-end) users.  Apple only seems to be concerned about selling iPods and iPads and iPhones, and they've abandoned their HIGH-END Apple Mac Pro users that want HIGH-END workstations for professional use.
    I guess if you want a high-end workstation, you have to go back to buying a Microsoft Windows PC, and start going back to using the Adobe suite, and just completely abandon Apple and Apple products all together.  (Apple is not in the business of designing or selling "high-end" products anymore).  Apple just designs low-end "overpriced" hardware, that you can't upgrade, and must toss in the garbage every other year, because you can't upgrade it.
    Apple has been heading this way for years, and the newest/latest "Black Shiny Trash Can" (that is NOT upgradeable and has no upgradeable PCIe slots and no way to even upgrade the video cards) and Apple has turned into a "disposable" computer company/business that just builds "All-In-One" garbage computers (that become extremely outdated and must be thrown away every other year, because they are not upgradeable) and you can't swap out video cards using standard COTS (Commercial Off The Shelf) latest Graphics Card adapters, and we can't even get the latest Mac OS X operating system to support the newest/latest graphics display hardware, it seems like our only choice (as others have stated before) is to abandon Apple products and begin moving/migrating back to Microsoft Windows 8.1 Pro machines.
    We can't get Apple to support their customers or update their operating system or support the newest/latest hardware in their operating system, so it seems to be a "dead end" ecosystem, and Windows 8.1 Pro and using standard PC hardware is probably a much cheaper/affordable route and it's a long-term solution, because Apple seems to come out with one nice product (every ten years) and then they don't support the product or it's users, or don't follow-up with Apple OS X operating system upgrades, and then you are stuck with very old outdated hardware because you can't even get the newest/latest drivers for the latest graphics cards/hardware.
    The only solution is to boot directly into Windows 8.1 Pro, and use Windows drivers, but then why even own a Apple Mac Pro if we can't use Apple OS X and can't even use our OS X software, and the only solution is to use our Apple Mac Pro as a Windows PC?
    We're really disappointed in Apple and how Apple fails to update Apple OS X and fails to support the latest graphics cards (such as the AMD R9 290 graphics card).
    I think 2014 is the last year that we are going to deal with Apple.  Starting in 2015, as part of our 2015 New Year's Resolution, I guess we'll start e-baying our Apple Mac Pro equipment, or selling it (as salvage) and begin purchasing standard Microsoft Windows 8.1 Pro high-end workstations, and get away from the old legacy dead-end Apple garbage hardware and dead-end Apple OS X operating system.
    It shouldn't be this hard, just to get some graphics drivers released to support the latest graphics card (which has been out for over a year now).  The Radeon R9 290 graphics cards were out in mid 2013 (for over a year and a half, almost 2 years now...) and we are already coming up on 2015, and Apple still hasn't added drivers support for the R9 290 series graphics cards to it's latest Apple OS X 10.10.1 Yosemite.
    It's a shame, but Apple has really gone downhill over the past few years.  Nothing but really old and outdated hardware, and even their "latest" Apple Mac Pro is 2-3 year old hardware (that Apple is marketing as "new") and it's non-upgradeable, and you can't even run/install the latest graphics cards into it.
    Apple is dead-end and it's not a place for "high-end" users anymore.  I guess Apple doesn't care about it's "high-end" user market anymore, and is just interested in designing silly iPhones and iPods/iPads.

  • HT5678 Carnegie-Mellon/DHS Vulnerability Note VU#858729 "Java contains multiple vulnerabilitie"

    does this update address/resolve the Carnegie-Mellon/DHS Vulnerability Note VU#858729 "Java contains multiple vulnerabilities" http://www.kb.cert.org/vuls/id/858729 ?

    Do you believe this update has the necessary changes to make it safe to re-enable our Java?
    Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. A discrete Java installer is distributed by Apple, and another one by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it, if at all, only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.

  • New to Apple/Mac

    Hello, I'm new to the Apple/Mac family. I've just acquired a Power Mac G4, 733mgz, 256 ram, 40gb HD with OS X 10.5. Is this going to be a viable alternative to my PC?
    I'm running Windows XP on a 1.6ghz with 512ram and an 80gb hd.
    I also have questions about the USB ports, should I look into additional USB card? If I want to upgrade the HD, do I have to stick with only Apple products?
    How about wireless internet, do I need to install the airport card? Currently I have a small antenna plugged into a USB port on my PC and it accesses my ATT U-Verse gateway. Any help would be greatly appreciated.
    Thanks.

    Hi angwchris, and a warm welcome to the forums & Macdom!
    I've just acquired a Power Mac G4, 733mgz, 256 ram, 40gb HD with OS X 10.5. Is this going to be a viable alternative to my PC?
    It'll be much slower, but it needs way more RAM, to see what'll be best for your exact Mac do this...
    At the Apple Icon at top left>About this Mac.
    Then click on More Info>Hardware and report this upto *but not including the Serial#*...
    Hardware Overview:
    Machine Name: Power Mac G5 Quad
    Machine Model: PowerMac11,2
    CPU Type: PowerPC G5 (1.1)
    Number Of CPUs: 4
    CPU Speed: 2.5 GHz
    L2 Cache (per CPU): 1 MB
    Memory: 10 GB
    Bus Speed: 1.25 GHz
    Boot ROM Version: 5.2.7f1
    I also have questions about the USB ports, should I look into additional USB card?
    Quite likely, but waiting for your specs.
    If I want to upgrade the HD, do I have to stick with only Apple products?
    Nope, but do you have the Install Disc(s) for 10.5?
    How about wireless internet, do I need to install the airport card?
    Waiting for specs, but there are options besides an Airport card.

  • How to connect and use Stor.E TV with Apple Mac

    Hi,
    I just bought the Stor.E tv but I use Apple mac.
    Is there a program that I can download or just some way I can connect my Stor.E to my computer?
    Right now it's locked.
    Thank you :)

    Hi
    Im not quite sure if you could use this since there is no special software for MAC OS leopard.
    But the TOSHIBA StorE TV supports an common USB port and can be connected to the mac/notebook using the common USB plug an play cable
    Maybe the MAC will recognize this external USB device automatically and you will not need to install any software or drivers

  • I have a Apple Mac desktop and recently was unable to access any YouTube, movies, videos, etc because a "Blocked Plug-in" message comes up with no error message. It asks to upload Abode Reader, but upon completion of this the message is the same.

    I have a Apple Mac desktop and recently can no longer access Youtube, videos, movies, etc because I get a message reading "Blocked Plug-in". There's no error message but it does say to upload Abode Flash Player and the problem will be solved. I do this but it doesn't fix the problem. What am I doing wrong?

    if you already downloaded the adobe flash player onto your mac and still getting that message that means you need to finish the installation of the flash player
    you do this by opening a finder window and going to your downloads, find the flash player in here and then double click on it and follow the prompts to complete the installation.
    after this is completed you will need to completely quit out of the web browser you're using then reopen it for the change to take affect and your issue should be resolved. if it's not you need to contact adobe their number is 800 642-3623.

  • HT1386 I have had to have a new hard drive fitted to my Apple Mac and now I can't sync my music with my iPhone, it thinks it's a new computer. Please help, What do I do?

    I have had to have a new hard drive fitted and now I cannot sync my Iphone with my Apple Mac, thinks it's a new computer. Any ideas Please?
    Alan C

    I keep this as a copy and paste. It's the same process for Mac as it is for a PC. Read it over and see what you think. Post back if you have questions.
    The following was copied from this thread. This is essentially what you want to accomplish.
    https://discussions.apple.com/message/11527071#11527071
    1) Without connecting your iPad to your laptop, start iTunes. Click on Preferences. Click on Devices. Check the box next to "Prevent your iPod etc. from automatically syncing." Click OK.
    2) Now connect your iPad to your Mac and start iTunes.
    3) When iTunes starts, right click on your iPad under Devices in the left column. Select Transfer purchases etc.
    4) After it finishes transferring all your apps to your new laptop, right click on your iPad and select Backup your iPad.
    5) After it finishes backing up your iPad, right click on your iPad and select Restore etc.
    6) After it finishes restoring, left click on your iPad , then click on the Apps tab on top, and check the box next to Sync Apps, then click on Apply below.
    If everything on your iPad looks good after the sync, go back and click on iTunes / Preferences / Devices and UN-check the box next to Prevent your iPod etc. The only other thing you may want to check is if your contacts, bookmarks, etc. are syncing correctly now. If not, go to the Info tab after connecting and make sure you indicate which features you want to sync with what sources.
    Read this thread and the support links as well. There are apps that you can purchase that will allow you to transfer photos from the iPad to your PC. Look at Photo Transfer App in the App store and you can search for others as well.
    https://discussions.apple.com/message/13016026#13016026
    This support site will help you with transferring iTunes music to your new computer.
    http://support.apple.com/kb/HT4527

  • My iPad doesn't come up up in devices when linked to my Apple Mac

    When connecting my iPad 2 via USB to my Apple Mac for syncing the device doesn't show in devices

    Do you even see the Devices heading in the sidebar ... Or do you even see the sidebar. Go to View>Show Sidebar from the iTunes menu to enable the sidebar, if you haven't done that. 
    If you have and it still doesn't show up, quit iTunes, restart the iPad, restart the Mac and try again.
    More help here.
    iOS: Device not recognized in iTunes for Mac OSX
    Mac OS X v10.6: iOS device not recognized in iTunes after restart

Maybe you are looking for