Security Update 2006-002 (10.3.9) has disabled my AirPort

After installing 2006-002 via Software Update on my 10.3.9 iBook, I can no longer see (via the Admin Utility) or connect to my Airport Extreme base station. The base station is up and running, as the G4 connected directly to it can get out to the Internet just fine. I've tried:
* restarting the base station (via power cycle) and the iBook
* repairing permissions
* reinstalling the update from the standalone package
all to no avail. Otherwise the machine seems to be running fine.

In the "never fails" category . . . went back onto the machine and signed on under a different account. Immediately got the the familiar Keychain dialog asking for permission for AirPort, responded yes, and the base station was suddenly visible to this account. Logged off, back in under the original account, got the same Keychain request (which had NEVER appeared before in 5 or 6 different logins) and was off and running again.

Similar Messages

  • After Security update 2006-002, RAM is halved

    Hi,
    Right after applying the Security Update 2006-002, I experienced a freeze upon wake-up from sleep. And a general application slowdown.
    A fleeting look past the About this Mac window surprisingly revealed that the system now identifies the two additional (trusty for 8 months or so) OWC 1GB RAM modules as 512kb only. Startup memory test is reported as failed - But the modules are still listed as OK.)
    I tried putting the modules in another bank. This works, after restart memory is identified correctly and system breezes. Unfortunately, another restart brings things back to the original, 1.5GB state.
    Resetting nvram (reset-nvram, set-defaults, reset-all) in OF also mostly has the same effect: First restart restores things back to normal, second restart brings the problem back.
    Having read about the recent PB problems where a system update aparently disabled one memory slot, something tells me it's not the RAM modules themselves. (Yes, they check out fine in memory tests.)
    Any ideas?
    Best,
    Ben

    Problem disappeared after I caved in and bought new RAM (Kingston Value Ram) as recomended by / from a local dealer. I am inclined to think this in fact was a defect in the RAM modules themselves, OWC has issued a RMA on them and I'm sending them back. Thanks!

  • Any Problems With Security Update 2006-002

    Hi a few weeks ago I updated my PowerBook G4 running Mac OS 10.3.9 to Apple Security Update 2006-001 and instantly my Dock Meny dissappeared after installation and Safari broke. My Dock Menu returned after installation but Safari remained broken.
    In the end I simply reinstalled Mac OS X Panther from scratch, recreated my user account and copied my data (I had it saved) back to my Mac.
    I don't want to run the risk of something like this happening again. I do not have Apple Security Update 2006-001 installed at this time but I do have Apple Security Updates from 2005 installed and 10.3.9 on my system.
    If I install Apple Security Update 2006-002 on my Mac (will be updating from 2005 security updates) - not updating 2006-001 to 2006-002 but installing first 2006 Security Update for the first time could I run into any problems?
    Want to hear from other users who have installed this update - have updated from 2006-001 and preferrably anyone who is installing this update directly (not over 2006-001) before updating myself.

    Ive got some serious problems with 2006-001 (and they wernt cured by installing 2006-002).
    Photoshop and flash mx stopped working and I am unable to reinstall either!
    Ive deleted all prefs, caches, everything associated with these apps.
    Ive tried installing different versions of both apps - but to no avail.
    Ive repaired disk permissions (even in single user mode) - and while that did straighten out a few incorrect permissions and uid's it did'nt fix my problems.
    Totally at the end of my tether now, and getting impatient with Apple - this is my livelyhood and I cant afford to have downtime!
    The "broken webkit" fiasco at the back end of last year was bad enough, but this just takes the p*!
    Not happy - but hopeful that someone has a fix (preferably one that doesn't involve archive and restore)....

  • Address Book & Mail crash after Security Update 2006 002 1.1

    hello,
    I recently installed Security Update 2006 002 v1.1 on my iBook G4 and since then Address Book has crashed on launch (also when launching from the Dashboard and from within Mail), and Mail now crashes when pasting text into a new message. I tried repairing permissions with Disk Utility and checking the locations of the apps. So far, nothing's helped.
    I've read similar problems on the discussions but haven't found any solutions. If I've missed something, please pass me a link - if not, any ideas?
    thank you
    scott

    Scott:
    The best way to preserve your data, preferences and settings it to do an Archive and Install. When you use that method the installer places your User Folder with the data etc. in a Previous Systems Folder and you retrieve them following the installation. Of course, before any major operation like that it is wise to backup those things, anyway, just in case something goes wrong.
    Here are some suggestions on installation:
    Tiger: Archive and Install (with a Clean Install Option)
    If you have the Full Retail Version of Tiger (computer specific disks for your computer) here is what you do.
    1. Warning: Although we will use Archive and Install there is always a risk something can go wrong. As a precaution back up your User Folder and any third party applications you can't afford to lose.
    2. Check to see if you have the latest Firmware Update. Note: You must be in OS 9 to update firmware
    3. Boot from the install disk holding down the C key.
    4. Once booted go to the Utilities Menu and open Disk Utility.
    To do a clean install see Notes below
    5. Run Repair Disk. If there are problems, run it until no problems are reported. If it reports that it can't repair the problems you might need TechTool Pro or Disk Warrior.
    6. While still in Disk Utility run Repair Permissions.
    7. Quit Disk Utility and open the Installer.
    8. Choose the option to Archive and Install. This saves your data in a Previous Systems folder, which you can retrieve after installation.
    9. You might want to Customize and deselect Foreign Language Translations and Additional Printer Drivers to save Hard Drive space.
    10. Proceed with installation.
    11. After installation is complete computer will restart. Follow prompts and set up computer.
    12. Open Disk Utility (Applications > Utilities > Disk Utility) and Repair Permissions.
    13. Go online and download updates, or go to Software Update under the Apple Menu and update your OS.
    14. Transfer your User Folder from Previous Systems folder.
    NOTE (below):
    To do a clean install:
    Follow steps 1 through 4 above.
    a. In Disk Utility select your HD in left panel and Erase in main panel.
    b. Be sure Volume Format is Mac OS Extended and the checkbox Mac OS 9 Drivers Installed is checked.
    c. Select Options at bottom left in Erase panel. WARNING! This procedure will erase the contents of your entire HDD. Be sure you back up anything you cannot afford to lose!
    Select option to zero all data. Click OK. Click Erase.
    This process will take a while, so this is a good time to take a long walk or call your mother
    d. After HDD is erased resume at No. 7 above.
    Post back with any questions or comments.
    Good luck.
    cornelius
    PismoG4 550, 100GB 5400 Toshiba internal, 1 GB RAM; Pismo 500 OS X (10.4.5)   Mac OS X (10.4.5)   Beige G3 OS 8.6

  • Problems with Security Update 2006-002

    Hi there,
    I have problems with latest security update. I do not know what went wrong, but after installing "Security Update 2006-002 (PowerPC)" (1.0) on 2006-03-14 15:52:40 +0100: with Software Update from Tiger, my desktop (and probably not only desktop) is damaged.
    The most visible thing is that all .html and .htm documents on my desktop does not have Safari icon anymore, they have some 'blank' icon and doubleclick on them DOES NOT start-up Safari, why?
    See here on the screenshot: http://www.jirkacech.com/files/Tiger-problemy-screeshot.png
    note blank "apple - start.webarchive" also the Safari itself have somehow damaged icon, to same blank thing with triangle, possibly some 'generic app' or 'default.app' icon. It sits in the dock on 5th from left...(dont worry about real safari icon, that's newly added by me)
    Also, on, second screenshot, http://www.jirkacech.com/files/Tiger-problemy-2.png you see that safari itself have some strange icon.
    I am getting crazy, since I do not know what else is broken by last update.
    I have tryed to repair permissions at least 3x, and also run update_prebindings and reboot, delete all system and user caches, and reboot.
    Whole issue is system-wide, not only for one user.
    iBook G4   Mac OS X (10.4.5)   1.33 GHz, 512 MB, 12-inch

    The first thing you can try, if this is limited only to Safari icons, is to select on such icon, then press COMMAND-I to open the Get Info window. In the Open With section select Safari from the dropdown menu as the default app. Then click on the Change All button.
    If this doesn't resolve the problem or if the problem extends to other appicons as well, then you may have some disk corruption resulting from not repairing the hard drive and permissions before doing the update. I suggest you do that:
    Boot from your Tiger DVD. After the installer loads select Disk Utility from the Utilities menu. After DU loads select your OS X volume from the list on the left, click on the First Aid tab, then click on the Repair Disk button. If DU reports any errors that have been fixed, then re-run Repair Disk until no errors are reported. If no errors are reported click on the Repair Permissions button. Wait until the operation completes, then quit DU and return to the installer. Now shutdown the computer for a couple of minutes and then restart normally.
    If DU reports errors it cannot fix, then you will need Disk Warrior (3.0.3 for Tiger) and/or TechTool Pro (4.1.1 for Tiger) to repair the drive. If you don't have either of them or if neither of them can fix the drive, then you will need to reformat the drive and reinstall OS X.

  • Problem with Security Update 2006-002

    I have downloaded and installed the latest security update (2006-002) on my iBook running 10.3.9. As a result apparently all my Keychain related functionality is gone: Keychain Access blocks forever trying to display the password of an entry, and, more annoying, all possibility of connecting to my WiFi network (WEP key) is also gone.
    I recreated a default Keychain, and tried to log on to the wifi network: the password dialog blocks forever here too.
    I tried to track down what are the components changed by 2006-002, and the list is really long (I'm lost in there). The only indice I have about the problem is my Library/<myusername>/console.log where I have entries of the type:
    Keychain Agent [318] NSKeychain is now obsolete!
    Keychain Agent [318] NSKeychainItem is now obsolete!
    Keychain Agent [318] NSKeychainSearch is now obsolete!
    I suspect some libraries have been changed by the update but my keychain software hasn't.
    Does anybody knows of a workaround? I'll backup and reformat/reinstall 10.3 tomorrow (after buying a pack of CDRs) but I'm rather annoyed to have to spend one or two days downloading and reinstalling all the software I need.

    Thierry,
    Great!
    A lot of individuals (myself included) believe that repairing permissions before and after an update will keep problems from ocurring.
    Glad it worked for you!
    Bob

  • Security Update 2006-002 V1.1  breaks Office V.x apps?

    After installing Security Update 2006-002 V1.1, Office V.x apps are broken (Word, Excel, Powerpoint):
    Date/Time: 2006-03-19 15:43:35.872 -0600
    OS Version: 10.4.5 (Build 8H14)
    Report Version: 4
    Command: Microsoft PowerPoint
    Path: /Applications/Microsoft Office X/Microsoft PowerPoint
    Parent: WindowServer [67]
    Version: 10.1.6 (10.1.6 (040913), © 1987-2001 Microsoft Corporation. All rights reserved.)
    PID: 288
    Thread: 0
    Exception: EXCBADACCESS (0x0001)
    Codes: KERNPROTECTIONFAILURE (0x0002) at 0x00000000
    Thread 0 Crashed:
    0 MCPZ.stb 0x0062fa88 0x5c59d0 + 434360
    1 MCPZ.stb 0x0062b3e8 0x5c59d0 + 416280
    2 MCPZ.stb 0x00629aec 0x5c59d0 + 409884
    3 MicrosoftOffice2001Z 0x020c2114 0x2008000 + 762132

    3ivx is an MPEG codec http://www.3ivx.com
    The problem I had occurred when trying to start any Office V.x app (Word, Excel, Powerpoint), either by clicking a Dock icon, or double-clicking the app icon.
    Double-clicking a document (.doc, .xls, .ppt) launched the relevant application without problem.
    I didn't find any other application that had the problem while 3ivx D4 v4.5.1 was installed, but did not search very far (e.g., Safari, Internet Explorer, Mail, iTunes, iPhoto all worked, but didn't try much else).
    Any hints in the crash log? That's where I found the line about the 3ivx codec.
    Is your install of Office V.x updated to latest? (which is not terribly recent, iirc, V10.1.6, at http://www.microsoft.com/mac/downloads.aspx#OfficeX).

  • Can't mount movie DVDs after Security Update 2006-002

    I installed Security Update 2006-002 today after all the preparation recommended by MacFixit. Everything came up fine, EXCEPT:
    Movie DVDs (e.g., as rented from Blockbuster) no longer mount.
    Yesterday, there was no problem.
    Dual G5 2.5 GHz   Mac OS X (10.4.5)  

    The following link describes MacFixit's recommendation for installation of 10.4.6, but it is basically the same recommendation as they have given for quite a while for any significant system update, including security updates:
    http://www.macfixit.com/index.php?date=2006-04-03
    Scroll down until you see "Update process recommendation".
    In my case, I had followed the "more cautious route" of this procedure but still had a problem, and then the problem went away when I did a (presumably extra) pre-binding.
    For system-wide updates (that is, 10.4.x -> 10.4.(x+1)) I've always used combo updaters rather than the supposedly specific-and-therefore-smaller updaters when updating the system. For the security update in question here, I downloaded the updater from the Apple site rather than use Software Update.
    Hope this helps.
    Dual G5 2.5 GHz   Mac OS X (10.4.5)  

  • I need help with the Security Update 2006-002!

    Security update has really screwed up the two systems I've installed it on:
    1) My G4 PowerBook refused to reboot after the update, getting only as far as the initialApple screen. Rebooting with a 10.4 install disk and using Disk Utilities to try to repair the disk either results in an "Unable to unmount disk" error, or if Repair does proceed, it is unable to repair the disk. I get a "Invalid node structure" error message, then a "Rebuilding B-Tree" message, then a "The Voluma Macintosh HD could not be repaird" message, and Repair quits with a "Error: the underlying task reported failure on exit" message.
    2) On my Dual 2 GHz G5 desktop, Safari appears to be unable to load more than six URL:s in 6 tabs; I read about 20 webcomics all organized in a bookmarks folder, and my usual practice is to select "Open in tabs" to open them all at once. Heretofore Safari has opened all the tabs and all the URLs without a hitch. After the update it will open all the ttabs but only about the first six sites load - all the rest just sit there spinning their wheels.
    Also it has hosed iChat on my Dsktop. iChat will open, but will not send or receive chats, and will not open the buddy window.
    Also Also, the system frequently hangs, seizing up anywhere from 30 seconds to a few minutes, then resuming normally. Safari seems to be the culprit, but I can't really tell.
    I need an update to recover from the effects of the last update.

    I'm not very knowledgeable on macs yet being a new user (switcher) However, there appear to have been too many problems for too many people and too many systems associated with this update for it to be co-incidental. Take a look through the topics since the update appeared. My computer is brand new. The update did something that screwed something in the startup file (or whatever) The nice man in India helped me get the computer going by removing all sorts of wonderous things, this after his colleague in Cork had sent me all sorts of stuff to my work address to try out when I got home, like pram and nvram (which only made things worse) and other things. Now my computers fixed. Except that there's now no printer, it won't find the drivers off the install discs and any driver I load from canon isn't recognised or a script isn't recognised. I bought this thing to get away from problems like this on PCs!!!!
    iMac Intel 20"   Mac OS X (10.4.4)  

  • Security Update 2006-002 won't install

    I've tried about 10 times, each time it gets to the point of writing but stops at 66% completion. Then tells me the software failed to install. Anyone else having trouble? This has happened to me on the last few updates. Could it be because I'm behind? I don't think it is because this software update says in incorporates the last few upgrades.

    Hi Jonathan:
    What's your hard drive capacity like? You should try to maintain at least 1-2 GB free.
    Also, how long have you had 512MB RAM? Have you recently upgraded? Poor-quality RAM could affect software updates. If this applies, remove any recently installed RAM and try the update. If successful, replace the RAM (though I'd get the RAM replaced).
    Andrew Penner

  • Security update 2006 v1.1

    The Security Update 2006 v1.1 has been released but the automatic update of Mac OS X don't propose anything to do!!! Should i do the update with the file present in the section "download" in Apple website?? or maybe this update don't concern my computer???
    PS : I have done the first security update properly (the update just previous the v1.1)

    The ability to launch Safari is not a 100% accurate method for checking if Safari has been patched with Security Update 2006-002 (v1 or v1.1).
    I am one of the users that needed the v1.1 update, because I had moved Safari into a sub folder. However, after patching with the version 1 updater, I was still able to use Safari without difficulty, by launching from the dock, which is the method I use 100% of the time.
    It was only this morning when I realized that the v1.0 and the v1.1 update didn't patch the Safari version.
    The symptoms of an unpatched Safari version are:
    1. Links from Mail.app won't launch Safari. They will open a new window if Safari is open.
    2. A 2.1 MB Safari app is in the Applications folder, but when clicked, does nothing.
    3. A 28 MB Safari app is in your subfolder (where you moved it), but isn't version 417.9.2.
    No doubt, this is due to me failing to RTFM. But, Apple should simply have made the v1.1 updater look for a 2.1 MB Safari.app application in the Application folder, and trash it, or at a minimum notify the user with a pop-up message, IMHO.
    So, Riad, if you want to be assured that your Safari.app is patched, you should launch it, and select Safari->About Safari and verify the version is 417.9.2 (on Intel...don't know if the version is the same for PPC).
    iMac Duo 20" | 2 GB | 256 MB Video   Mac OS X (10.4.5)   Smokin' fast and sweet

  • Security Update 2015-002 Apple ID login no longer recognised

    Just downloaded Security Update 2015-002 and Apple ID has become fried
    Cannot login to App Store to download remaining app updates, having problems accessing Apple ID: have had to change password (unwillingly) and Manage Apple ID reporting 'Unknown Error' when I try to login, App Store showing 'Status_Code_Error'

    Hi, I already posted this to another discussion and I just want to brought this up here. I noticed that when using safari to search for the error message, I was automatically logged as someone else who I never know. I'm sure that no one else is using my laptop and login in apple site. Here's the screenshot. I intensionally removed the email to protect the account.

  • Apple Releases Security Update 2006-004 (PowerPC and Intel)

    From Macfixit................
    Apple has released Security Update 2006-004 for Mac OS X in both PowerPC and Intel versions. This update requires Mac OS X 10.4.7 for either PowerPC or Intel, Mac OS X 10.3.9 or Mac OS X 10.3.9 Server.
    This is the fourth major standalone security update for Mac OS X released this year.
    Update procedure recommendation First, avoid performing any other operations (in Mac OS X or third-party applications) while the update process is occurring. In addition, before installing this security update, make sure all Apple-installed applications and utilities are in their original locations. Moving one of these applications to a different location on your hard drive can lead to an incomplete update. Also, disconnect any FireWire/USB devices before applying the update (except for your startup drive, if it is FireWire or USB, and your keyboard/mouse), then re-connect the devices one by one (checking for issues created by any particular device) after the update process is complete and the system has restarted.
    Enhancements in this release
    Of most interest to general end-users:
    a fix that prevents maliciously crafted Zip archives from causing condition where arbitrary code can be execute. In other words, prior to Security Update 2006-004 you could download a specially crafted file ending in .zip from a Web site or other location, and it could trigger the execution of malicious code.
    a fix that disallows maliciously crafted Canon RAW images from creating a buffer overflow, potentially leading to arbitrary code execution. Prior to Security Update 2006-004, you could download or otherwise receive a Canon RAW file that could allow execution of malicious code on your system.
    similar to the above, a fix that prevents maliciously crafted GIF images from causing an integer overflow, potentially leading to arbitrary code execution.
    new download validation that will catch certain HTML files defined by Safari as "safe" that may actually contain malicious JavaScript code. After applying Security Update 2006-004, these files will not be automatically opened.
    Protection against maliciously crafted HTML documents that can also open the door for arbitrary code execution by accessing deallocated objects.
    A full list of enhancements is as follows:
    AFP Server
    An issue in the AFP server allows search results to include files and folders for which the user performing the search has no access. This may lead to information disclosure if the names themselves are sensitive information. If the permissions of the items allow it, the contents may also be accessible. This update addresses the issue in Mac OS X v10.3.9 by ensuring that search results only include items for which the user is authorized. For Mac OS X v10.4 systems, the issue was addressed in Mac OS X v10.4.7. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9:
    The AFP server contains an integer overflow that can be triggered by an authenticated user. A malicious user with access to the AFP server may be able to cause a denial of service attack or arbitrary code execution with system privileges. The AFP server is not enabled by default on Mac OS X. This update addresses the issue by performing additional validation. Credit to Dino Dai Zovi of Matasano Security for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    On Mac OS X Server, the AFP server supports reconnection of file sharing sessions after a network outage. The storage of reconnect keys is world-readable. It may be possible for an authenticated local user to read the reconnect keys, use them to impersonate another user over AFP, and access files or folders with the privileges of the impersonated user. This update addresses the issue by protecting the reconnect keys with appropriate file system permissions. This issue only affects Mac OS X Server. Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.7.
    An unchecked error condition exists in the AFP server that may lead to a crash. By carefully crafting an invalid AFP request, an attacker may be able to trigger this condition and cause a denial of service. This update addresses the issue by handling the formerly unchecked error condition. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bluetooth
    The security of the Bluetooth Setup Assistant has been improved in this update for Mac OS X v10.4.7. The length of the automatically generated passkey used for pairing has been increased from six characters to eight characters. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bom
    An issue in Bom's compression state handling may cause heap corruption. By carefully crafting a corrupt Zip archive and persuading a victim to open it, an attacker may be able to trigger this condition which could lead to an application crash or arbitrary code execution. Note that Safari will automatically open archives when "Open `safe' files after downloading" is enabled. This update addresses the issue by properly handling such malformed Zip archives. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    DHCP
    A stack buffer overflow exists in bootpd's request processing. By carefully crafting a malicious BOOTP request, a remote attacker may be able to trigger the overflow and cause arbitrary code execution with the privileges of the system. Note that bootpd is not enabled by default in Mac OS X, and must be manually configured in order to be enabled. This update addresses the issue by performing additional bounds checking. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    dyld
    Malicious local system users may specify dynamic linker options that cause output to standard error. This output contains informational content and potentially user-specified content. As a result, privileged applications that parse or reuse standard error may be influenced inappropriately. This update addresses the issue by ignoring the problematic dynamic linker options in privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    An improperly handled condition in the dynamic linker may lead to including dangerous paths when searching for libraries to load into privileged applications. As a result, malicious local users may cause the dynamic linker to load and execute arbitrary code with elevated privileges. This update addresses the issue by properly selecting search paths when executing privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    fetchmail
    Several issues in the fetchmail utility were discovered. The most serious issue could lead to arbitrary code execution when fetching mail from a malicious POP3 mail server. All issues are described at the fetchmail website (fetchmail.berlios.de). This update addresses the issues by updating fetchmail to version 6.3.4. In addition, fetchmail is no longer distributed as a privileged utility. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    gunzip
    A race condition may allow a malicious local user to modify the permissions of files owned by another user executing gunzip. This issue is only exploitable when executing gunzip on files in directories that are modifiable by other users. This update addresses the issue by properly handling files while decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    A directory traversal vulnerability is present in the command line utility gunzip when it is used with the non-default "-N" option. By carefully crafting a malicious compressed file and persuading a user to open it with "gunzip -N", an attacker may replace or create arbitrary files with the privileges of the victim. This update addresses the issue by properly stripping paths from files when decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Image RAW
    By carefully crafting a corrupt Canon RAW image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Canon RAW images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    ImageIO
    By carefully crafting a corrupt Radiance image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Radiance images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    By carefully crafting a corrupt GIF image, an attacker can trigger an undetected memory allocation failure which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    By carefully crafting a corrupt GIF image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    LaunchServices
    Download Validation may erroneously identify certain files containing HTML as "safe". If such a file is downloaded in Safari and Safari's "Open `safe' files after downloading" option is enabled, the HTML document will automatically be opened from a local URI. This would allow any JavaScript code embedded in the document to bypass access restrictions normally imposed on remote content. This update provides additional checks to identify potentially malicious file types so that they are not automatically opened. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    OpenSSH
    Attempting to log in to an OpenSSH server ("Remote Login") using a nonexistent account causes the authentication process to hang. An attacker can exploit this behavior to detect the existence of a particular account. A large number of such attempts may lead to a denial of service. This update addresses the issue by properly handling attempted logins by nonexistent users. This issue does not affect systems prior to Mac OS X v10.4. Credit to Rob Middleton of the Centenary Institute (Sydney, Australia) for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    telnet
    When connected to a TELNET server, the client may send the contents of arbitrary environment variables to the server if the server requests them. Some environment variables may contain sensitive information that should not be sent over the network. This update addresses the issue by ensuring that only non-sensitive variables and variables that the user has explicitly requested are are shared with the server. Credit to Gael Delalleau and iDEFENSE for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    WebKit
    A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. This update addresses the issue by properly handling such documents. Credit to Jesse Ruderman of Mozilla Corporation for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    AppKit, ImageIO
    Buffer overflows were discovered in TIFF tag handling (CVE-2006-3459, CVE-2006-3465), the TIFF PixarLog decoder (CVE-2006-3461), and the TIFF NeXT RLE decoder (CVE-2006-3462). By carefully crafting a corrupt TIFF image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of TIFF images. Systems prior to Mac OS X v10.4 are affected only by the TIFF NeXT RLE decoder issue (CVE-2006-3462). Credit to Tavis Ormandy, Google Security Team for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7./

    Right after installing Security Update 2006-004 (Intel) on my macbook pro I am having troubles with my wireless connectivity. Here is the dump from the console:
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    I can reboot and it will work, but if I put my macbook to sleep it, when I wake it, it will do the same thing again.
    I am also getting timeouts waiting for results of 1st wireless scan to complete in console.
    Anyone else having this issue?
    MBP15-2GHZ   Mac OS X (10.4.7)  

  • System preferences shot after Security Update 2006-008 - no sound any more

    All sorts of strange problems after running the 2006-008 security update, yet only affecting one my two MacMini:
    System Preferences completely "shot", with the Date&Time item/icon looking very odd.
    The little flag for language/keyboard setting and date/time did not show any more in the top menu bar -- basically everything left side of the blue Spotlight magnifying glass icon was gone.
    Also Safari much more prone to quit.
    Managed to delete some prefs and cached stuff and to replace the System Preferences application with the one from the other (working ok) Mac.
    (I wish such components were available on the web!)
    However: Currently I get no sound whatsoever. When I check the option to have the little speaker symbol displayed in the menu bar it shows. But as soon as I click it once, it vanishes from the menu bar.
    In the Sound window, I have Volume set to full, yet everything is greyed out, "Sound off" is checked without my doing, while "Display sound volume in the menu bar" unchecks itself everytime(!)
    And, very odd: While resetting PRAM and the fsck-routine working ok (no problems found) and disk utility claiming to have repaired all permissions, I can not run a reset of Open Firmware/nvram with the O-F-Apple-Alt key combination (I'm using an original Apple USB Keyboard for this, since I'm aware that my 3rd party keyboards from Logitech and Microsoft often refuse to perform such kind of "low level" tasks).
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

    finally found the solution to my problems at
    http://www.macfixit.com/article.php?story=20061229012312895
    Late-Breakers
    Friday, December 29 2006 @ 01:23 AM PST
    Security Update 2006-008 Special Report: General fixes for common issues
    "Re-apply the Mac OS X 10.4.8 combo updater Once again, re-application of the current combination updater (Mac OS X 10.4.8 for PowerPC or Intel) has proven useful in the case of Security Update 2006-008. Doing so overwrites potentially problem-causing files".
    while it is widely known that the folks from redmond do release software before all the bugs are removed, i was not aware before that apple is following the same approach: using their customers as guinea pigs when it comes to updates. there is plenty of reports on MacFixIt about all sorts of troubles with previous apple os updates.
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

  • Printing problems after installing Security Update 2015-002

    After installing Security Update 2015-002 on three separate computers on two different WiFi networks, printers on the network are losing their connections to the computers that can print to them. We have experienced this on a network running a Canon printer and an HP printer - both have disappeared on the network although the printer suggests it is still connected to the network. The same thing has happened on a separate network I manage with a single HP printer on that network. I have tried removing the printers, resetting the printers etc. Nothing is working. I can get one print out of a printer when I turn the printer off and then on. Three minutes later the printer is no longer connected to the computer - although still connected to the network. Please Help.

    I think I have figured out that it is in fact the Apple Extreme Base Station that is losing the printer. It is very odd because the printer is connected to the Wifi. My computer is connected to the WiFi and connecting to the internet. The Router for the internet can see the printer. An Apple Extreme is then connected via a network cable in Bridge mode to the router. When I turned the power off the The Apple Extreme and then restored power it all worked. was still working this morning, but again this afternoon I needed to reboot Apple Extreme. It is quite strange that this is happening on two different Networks in different parts of the country at the same time. Maybe the Security Update is somehow affecting/blocking communication with the printer? I just don't know enough. These networks have been up and running with the same printers and computers for years with zero problems - all of a sudden we have the same problem on both Networks.
    Any help will be very much appreciated.

Maybe you are looking for