Does security update 2006-1 kill ODBC drivers?

I do development work on my personal machine, which requires an ODBC connection to a database on a server. All worked well until the 2006-1 security patch. Now, the drivers won't load.
Do I need to reinstall iODBC over the existing drivers? Is there a patch to the patch?

The update prevents spamd to run as the default user "nobody". Running it as root seems to be the only workaround.

Similar Messages

  • Did Security Update 2006-001 kill SpamAssassin 3.1.0?

    Greetings,
    It appears Apple's Mac OS X 10.3 (Panther) Security Update 2006-001 has killed my SA 3.1.0. After the update, upon starting spamd this is what happens:
    Mar 3 14:05:00 localhost spamd[15757]: spamd: server started on UNIX
    domain socket /tmp/spamd.sock (running version
    3.1.0-agsvsoft_2005102101)
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server pid: 15757
    Mar 3 14:05:01 localhost spamd[15759]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15759
    Mar 3 14:05:01 localhost spamd[15760]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15760
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:01 localhost spamd[15762]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15762
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15763]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15763
    Mar 3 14:05:01 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15759 due to SIGCHLD
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15764]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15764
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:01 localhost spamd[15765]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15765
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:02 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15762 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15760 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15763 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15764 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15766]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15766
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:02 localhost spamd[15767]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15767
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:02 localhost spamd[15768]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15768
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:02 localhost spamd[15769]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15769
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:03 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15765 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15767 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15766 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15768 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15770
    Mar 3 14:05:03 localhost spamd[15770]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:03 localhost spamd[15771]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15771
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:03 localhost spamd[15772]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15772
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:04 localhost spamd[15773]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15773
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:04 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15769 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15772 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15770 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15771 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15774]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15774
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:04 localhost spamd[15775]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15775
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:04 localhost spamd[15776]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15776
    Mar 3 14:05:05 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15773 due to SIGCHLD
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:05 localhost spamd[15777]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15777
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    [snip]
    Has anyone else seen this? I note from the release notes:
    perl
    CVE-ID: CVE-2005-4217
    Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9
    Impact: Perl programs may fail to drop privileges
    Description: When a perl program running as root attempts to switch to another user ID, the operation may fail without notification to the program. This may cause a program to continue to run with root privileges, assuming they have been dropped. This can cause security issues in third-party tools. This update addresses the issue by preventing such applications from continuing if the operation fails. This issue does not affect Mac OS X v10.4 or later systems. Credit to Jason Self for reporting this issue.
    Any advice would be most appreciated.
    Cheers,
    Damon
    PowerMac G4-867   Mac OS X (10.3.9)  

    The update prevents spamd to run as the default user "nobody". Running it as root seems to be the only workaround.

  • Security Update 2006-001 Killed network preferences

    After upgrading with the 2006-001 Security Update, none of my network preferences will set up correctly anymore. DHCP doesn't seem to be doing anything, and when I tell it to use a manual address via the system preferences, it appears that it's not actually doing anything. Mac OS System Preferences will not even detect that I have an ethernet cable plugged in, though if I use ifconfig and route I can get a LITTLE bit of traffic to go out, so I know it's connected and working.
    Any one have any ideas on this? Absolutely frustrating because I can no longer work until this is fixed (sitting in an internet cafe trying to figure out what the problem is). I'm running 10.3.9 on a 1.2Ghz 12" Powerbook. I don't remember my Unix days well enough to try to manually set up routes and our DNS settings, nor do I know if the appropriate tools are in Mac OS, but the Apple network preferences are clearly busted.
    Is there anyway to uninstall an update?
    Patrick
    12" 1.2 Ghz PB   Mac OS X (10.3.9)  

    I had the same Network & Airport issue after installing Security Update 2006-001 on my wife's iBook G3 running 10.3.9 Trying to access our Airport base station wirelessly would inevitably hang as I selected the Airport network.
    I noticed that every time I shut down the computer there was a brief showing of the keychain window asking to allow keychain access...this right as the computer went down (no chance to hit the allow button).
    Spent the better part of an entire afternoon trying to fix this problem. Then read all the posts here (amazing how many people have problems with this update). Tried to reset permissions - didn't work. In the end, I rebooted the Airport...went into the Airport Admin Utility with my PowerBook to fiddle around...removed our Airport network from the keychain in my wife's iBook...explored other aspects via the keychain access utility.
    None of that seemed to work. I also figure I reset the permissions about half a dozen times (with subsequent reboot). None of that was working either...until after one permissions reset & reboot things came good. I got the keychain window, allowed access, and hey presto...online. So far it's been OK for over 12 hours (including after reboot).
    What exactly worked? I don't know. "It's a mystery".
    One thing's for sure...this update is not going on any of my other machines!
    Come on Apple...surely you can do better than send us automatic updates that break our computers and sap our time!
    iBook   Mac OS X (10.3.9)  

  • Security Update 2006-005 || sleep issues

    after installing Security Update 2006-005, like others i had problems with connecting to my airport express, sluggish behavior, and some hanging apps (unable to kill or forcequit). i deleted various cache files (via macfixit suggestion), zapped pram, repaired disk permissions. things seem to be working fine now, with the exception that my computer will no longer sleep. has anyone experienced this? also of note, when i have tried to get the computer to sleep and ichat is running, it tries to disconnect, then the application hangs, and cannot be quit, force quit or killed.
    please help, my mac wishes to sleep again.
    e.

    what does this do, is it stronger than just a force quit or a kill?
    also, my issues resolved. after zapping pram, permissions, cache cleanup, and macjanitor, the last ingredient was to turn the computer off for a while. i have heard unplugging the power supply isn't a bad idea either.
    i stepped away, and later when i turned the machine back on, all my maintenance/cleanup work finally took and things were running well again. looks like it just needed some cleanup and a rest.
    e.

  • Apple Releases Security Update 2006-004 (PowerPC and Intel)

    From Macfixit................
    Apple has released Security Update 2006-004 for Mac OS X in both PowerPC and Intel versions. This update requires Mac OS X 10.4.7 for either PowerPC or Intel, Mac OS X 10.3.9 or Mac OS X 10.3.9 Server.
    This is the fourth major standalone security update for Mac OS X released this year.
    Update procedure recommendation First, avoid performing any other operations (in Mac OS X or third-party applications) while the update process is occurring. In addition, before installing this security update, make sure all Apple-installed applications and utilities are in their original locations. Moving one of these applications to a different location on your hard drive can lead to an incomplete update. Also, disconnect any FireWire/USB devices before applying the update (except for your startup drive, if it is FireWire or USB, and your keyboard/mouse), then re-connect the devices one by one (checking for issues created by any particular device) after the update process is complete and the system has restarted.
    Enhancements in this release
    Of most interest to general end-users:
    a fix that prevents maliciously crafted Zip archives from causing condition where arbitrary code can be execute. In other words, prior to Security Update 2006-004 you could download a specially crafted file ending in .zip from a Web site or other location, and it could trigger the execution of malicious code.
    a fix that disallows maliciously crafted Canon RAW images from creating a buffer overflow, potentially leading to arbitrary code execution. Prior to Security Update 2006-004, you could download or otherwise receive a Canon RAW file that could allow execution of malicious code on your system.
    similar to the above, a fix that prevents maliciously crafted GIF images from causing an integer overflow, potentially leading to arbitrary code execution.
    new download validation that will catch certain HTML files defined by Safari as "safe" that may actually contain malicious JavaScript code. After applying Security Update 2006-004, these files will not be automatically opened.
    Protection against maliciously crafted HTML documents that can also open the door for arbitrary code execution by accessing deallocated objects.
    A full list of enhancements is as follows:
    AFP Server
    An issue in the AFP server allows search results to include files and folders for which the user performing the search has no access. This may lead to information disclosure if the names themselves are sensitive information. If the permissions of the items allow it, the contents may also be accessible. This update addresses the issue in Mac OS X v10.3.9 by ensuring that search results only include items for which the user is authorized. For Mac OS X v10.4 systems, the issue was addressed in Mac OS X v10.4.7. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9:
    The AFP server contains an integer overflow that can be triggered by an authenticated user. A malicious user with access to the AFP server may be able to cause a denial of service attack or arbitrary code execution with system privileges. The AFP server is not enabled by default on Mac OS X. This update addresses the issue by performing additional validation. Credit to Dino Dai Zovi of Matasano Security for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    On Mac OS X Server, the AFP server supports reconnection of file sharing sessions after a network outage. The storage of reconnect keys is world-readable. It may be possible for an authenticated local user to read the reconnect keys, use them to impersonate another user over AFP, and access files or folders with the privileges of the impersonated user. This update addresses the issue by protecting the reconnect keys with appropriate file system permissions. This issue only affects Mac OS X Server. Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.7.
    An unchecked error condition exists in the AFP server that may lead to a crash. By carefully crafting an invalid AFP request, an attacker may be able to trigger this condition and cause a denial of service. This update addresses the issue by handling the formerly unchecked error condition. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bluetooth
    The security of the Bluetooth Setup Assistant has been improved in this update for Mac OS X v10.4.7. The length of the automatically generated passkey used for pairing has been increased from six characters to eight characters. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bom
    An issue in Bom's compression state handling may cause heap corruption. By carefully crafting a corrupt Zip archive and persuading a victim to open it, an attacker may be able to trigger this condition which could lead to an application crash or arbitrary code execution. Note that Safari will automatically open archives when "Open `safe' files after downloading" is enabled. This update addresses the issue by properly handling such malformed Zip archives. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    DHCP
    A stack buffer overflow exists in bootpd's request processing. By carefully crafting a malicious BOOTP request, a remote attacker may be able to trigger the overflow and cause arbitrary code execution with the privileges of the system. Note that bootpd is not enabled by default in Mac OS X, and must be manually configured in order to be enabled. This update addresses the issue by performing additional bounds checking. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    dyld
    Malicious local system users may specify dynamic linker options that cause output to standard error. This output contains informational content and potentially user-specified content. As a result, privileged applications that parse or reuse standard error may be influenced inappropriately. This update addresses the issue by ignoring the problematic dynamic linker options in privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    An improperly handled condition in the dynamic linker may lead to including dangerous paths when searching for libraries to load into privileged applications. As a result, malicious local users may cause the dynamic linker to load and execute arbitrary code with elevated privileges. This update addresses the issue by properly selecting search paths when executing privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    fetchmail
    Several issues in the fetchmail utility were discovered. The most serious issue could lead to arbitrary code execution when fetching mail from a malicious POP3 mail server. All issues are described at the fetchmail website (fetchmail.berlios.de). This update addresses the issues by updating fetchmail to version 6.3.4. In addition, fetchmail is no longer distributed as a privileged utility. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    gunzip
    A race condition may allow a malicious local user to modify the permissions of files owned by another user executing gunzip. This issue is only exploitable when executing gunzip on files in directories that are modifiable by other users. This update addresses the issue by properly handling files while decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    A directory traversal vulnerability is present in the command line utility gunzip when it is used with the non-default "-N" option. By carefully crafting a malicious compressed file and persuading a user to open it with "gunzip -N", an attacker may replace or create arbitrary files with the privileges of the victim. This update addresses the issue by properly stripping paths from files when decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Image RAW
    By carefully crafting a corrupt Canon RAW image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Canon RAW images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    ImageIO
    By carefully crafting a corrupt Radiance image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Radiance images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    By carefully crafting a corrupt GIF image, an attacker can trigger an undetected memory allocation failure which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    By carefully crafting a corrupt GIF image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    LaunchServices
    Download Validation may erroneously identify certain files containing HTML as "safe". If such a file is downloaded in Safari and Safari's "Open `safe' files after downloading" option is enabled, the HTML document will automatically be opened from a local URI. This would allow any JavaScript code embedded in the document to bypass access restrictions normally imposed on remote content. This update provides additional checks to identify potentially malicious file types so that they are not automatically opened. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    OpenSSH
    Attempting to log in to an OpenSSH server ("Remote Login") using a nonexistent account causes the authentication process to hang. An attacker can exploit this behavior to detect the existence of a particular account. A large number of such attempts may lead to a denial of service. This update addresses the issue by properly handling attempted logins by nonexistent users. This issue does not affect systems prior to Mac OS X v10.4. Credit to Rob Middleton of the Centenary Institute (Sydney, Australia) for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    telnet
    When connected to a TELNET server, the client may send the contents of arbitrary environment variables to the server if the server requests them. Some environment variables may contain sensitive information that should not be sent over the network. This update addresses the issue by ensuring that only non-sensitive variables and variables that the user has explicitly requested are are shared with the server. Credit to Gael Delalleau and iDEFENSE for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    WebKit
    A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. This update addresses the issue by properly handling such documents. Credit to Jesse Ruderman of Mozilla Corporation for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    AppKit, ImageIO
    Buffer overflows were discovered in TIFF tag handling (CVE-2006-3459, CVE-2006-3465), the TIFF PixarLog decoder (CVE-2006-3461), and the TIFF NeXT RLE decoder (CVE-2006-3462). By carefully crafting a corrupt TIFF image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of TIFF images. Systems prior to Mac OS X v10.4 are affected only by the TIFF NeXT RLE decoder issue (CVE-2006-3462). Credit to Tavis Ormandy, Google Security Team for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7./

    Right after installing Security Update 2006-004 (Intel) on my macbook pro I am having troubles with my wireless connectivity. Here is the dump from the console:
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    I can reboot and it will work, but if I put my macbook to sleep it, when I wake it, it will do the same thing again.
    I am also getting timeouts waiting for results of 1st wireless scan to complete in console.
    Anyone else having this issue?
    MBP15-2GHZ   Mac OS X (10.4.7)  

  • System preferences shot after Security Update 2006-008 - no sound any more

    All sorts of strange problems after running the 2006-008 security update, yet only affecting one my two MacMini:
    System Preferences completely "shot", with the Date&Time item/icon looking very odd.
    The little flag for language/keyboard setting and date/time did not show any more in the top menu bar -- basically everything left side of the blue Spotlight magnifying glass icon was gone.
    Also Safari much more prone to quit.
    Managed to delete some prefs and cached stuff and to replace the System Preferences application with the one from the other (working ok) Mac.
    (I wish such components were available on the web!)
    However: Currently I get no sound whatsoever. When I check the option to have the little speaker symbol displayed in the menu bar it shows. But as soon as I click it once, it vanishes from the menu bar.
    In the Sound window, I have Volume set to full, yet everything is greyed out, "Sound off" is checked without my doing, while "Display sound volume in the menu bar" unchecks itself everytime(!)
    And, very odd: While resetting PRAM and the fsck-routine working ok (no problems found) and disk utility claiming to have repaired all permissions, I can not run a reset of Open Firmware/nvram with the O-F-Apple-Alt key combination (I'm using an original Apple USB Keyboard for this, since I'm aware that my 3rd party keyboards from Logitech and Microsoft often refuse to perform such kind of "low level" tasks).
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

    finally found the solution to my problems at
    http://www.macfixit.com/article.php?story=20061229012312895
    Late-Breakers
    Friday, December 29 2006 @ 01:23 AM PST
    Security Update 2006-008 Special Report: General fixes for common issues
    "Re-apply the Mac OS X 10.4.8 combo updater Once again, re-application of the current combination updater (Mac OS X 10.4.8 for PowerPC or Intel) has proven useful in the case of Security Update 2006-008. Doing so overwrites potentially problem-causing files".
    while it is widely known that the folks from redmond do release software before all the bugs are removed, i was not aware before that apple is following the same approach: using their customers as guinea pigs when it comes to updates. there is plenty of reports on MacFixIt about all sorts of troubles with previous apple os updates.
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

  • Apache denying http requests- could it be Security update 2006-007PPC?

    I've been webhosting off an iMac G4 for two years and yesterday no one could access any of the pages, coming from multiple DNSs. I opened up sharing and turned on the log, saw some denials. Some improvement by toggling Personal Web Sharing, but goes back to not letting requests go through. Just so happens, I upgraded the hard drive the day before using carbon copy cloner and also converted the main page to a CSS, although can't imagine that would do it since I used the template from a working page. Could it be one of these changed some Apache settings or Security Upgrade is responsible? I'm on the phone right now, telling someone I'm working on it....

    12190 deny tcp from any to any
    65535 allow ip from any to any</pre>Usually, though,
    if you turn on a service, the corresponding port
    should open in the firewall. If the firewall is off,
    I just get the last line starting with
    65535.
    That's about the same, I just didn't publish the info on the other ports because I didn't think it was pertinent.
    Checking
    the access log, I had been getting hammered for a
    while by something automated on PHP calendar I had
    posted- so I shut that down.
    I'm not sure I understand this. Does this mean you
    shut off the firewall and got the hits, or you saw
    the hits being denied? The other log entries you
    posted came from the system log or console, and
    not the Apache access log.
    I can see where that was confusing. Upon reviewing the httpd/access log (as well as any other I thought might provide a clue), there were a slew of hits, all different times of the day from one IP address, all on the PHPicalendar page I had posted. Sometimes the requests would be an individual hit, but most times they would come in groups of ten or twenty all about 4 seconds apart. These were logged all the way back to the oldest entries still in the log files. The computer had been dutifully fulfilling the requests and this most likely explains some system slowness I had been seeing on the machine. Since then I disabled that page and the requests get a 404 reply from Apache. I threw that comment out to justify why I was interested in changing my IP address. By the way, google calendar and iCal integrate really nicely, allowing iCal to subscribe to the google calendar and then I could export the iCal to the PHPicalendar. A little circuitous, but not annoyingly so. Anyway, now that I know that it's being targeted I'll probably just work with google calendar and the google notifier app for macs.
    Again, the closest event to
    the known start of the problem was the Security
    Update 2006-007PPC.
    For what it's worth, I've applied the Security Update
    on this iMac without this problem. Which is not to
    say it's not possible it caused the problem. But if
    so, it's still more likely to be something isolated
    to your system and not a general bug in the update.
    I think I might have figured out the problem. Going through the system log, I noticed the computer sleeping and waking. I went to system prefs and checked the settings, then changed to "never sleep." Seems to be working. I know I didn't change that setting, and I was under the impression that before, the http requests were waking the computer up- although I don't know, I just never had this problem before. To add to the confusion at one point the subnet address of the machine changed because I was trying to debug by doing a network restart and the router was pointing to the wrong computer. I'll have to check with the other users of this machine to see if they altered the setting- but they may not fess up since they know they're not supposed to mess with system prefs- as it is, I've got the parental controls turned on.
    As for the stability of the Comcast IP address, I
    unplugged the modem for about 6 hours last night,
    plugged it back and had the same IP
    address.
    That's been my experience, too. Comcast's IP
    addresses are tied to the MAC address of whatever
    customer supplied equipment faces it. I think you
    might have to be disconnected from the cable modem
    until the DHCP lease expires, and someone else gets
    your old IP address, in order to get a new IP
    address.
    I've been able to force a new IP address by changing
    the MAC address on my router. However, if you decide
    to try this, only use the MAC address from a
    device you have in your physical possession. For
    example, you could clone the MAC address from one of
    your computers to the router. Just make sure you go
    back to the router's real MAC address if you get rid
    of the computer.
    Remember, you have to reboot the cable modem any time
    you change the MAC address of the device connected to
    it. Just like you would if you connected a different
    computer directly to the cable modem.
    charlie
    Thanks, I'll try that. I'm going to give it another day or two to see if it's stable again.
    dan
    iMac G4, MacBook   Mac OS X (10.4.8)  

  • Focus switch to finder after Security Update 2006-001

    Just updated with Security Update 2006-001 on PB G4 running 10.4.5.
    While running Safari or Mail or any App. and not using the app (like when reading a webpage or mail message) the focus of the OS switches to the Finder after about 10 seconds or so. So in the top menubar right from Apple icon the OS switches from Safari or Mail to Finder.
    Moving the mouse does not make any difference. i.e does not prevent or delay the switch.
    Clicking on the application window returns focus to that application (Safari or Mail).
    Anyone?

    thanks for the input. did not resolve the probelm though. finder started to crash every 2 minutes.
    but on the bright side: its a user thing. my guest account was not affected.
    so i trashed most of my prefs. that resolved the finder problem.
    currently working on restoring my prefs & email accounts, oh well

  • After applying Security Update 2006-001 can't launch Office X apps

    I noticed that, after applying Security Update 2006-001, I can't launch Microsoft Word nor Excel nor Power Point (Office X, 10.1.6 updated). If I double click the app icon, select and try to open from File menu or try to launch it from the Dock, I get the message "The app has unexpectedly quit". This does not affect Entourage so far. I can open existing files double clicking on their icons and, once the app is running, create new files from menu bar. Repaired permissions, checked for corrupted preferences files or templates but to no avail.
    Can anybody help?
    iBook G4   Mac OS X (10.3.9)   512 MB RAM

    DivX Doctor is a freeware I had downloaded a few days before applying Security Update 2006-01 (http://www.macupdate.com/info.php/id/4683). It certainly was responsible for my problems with Office X apps because, as I said, they completely disappeared as soon as I got rid of it.
    I hadn't the memory problems you mentioned (I've applied also Security update 2006-02 without problems).
    Don't know if this can help, but you might want to give a try to Disk inventory X (http://www.macupdate.com/info.php/id/14393) [quote]Disk Inventory X is a disk usage utility for Mac OS X. It shows the sizes of files and folders in a special graphical way called "treemaps".
    If you've ever wondered were all your disk space has gone, Disk Inventory X will help you to answer this question.[/quote]
    Once DiskWarrior fixed a problem with free hard disk space on my machine, even though a small one.
    iBook G4    

  • Problems with Security Update 2006-002

    Hi there,
    I have problems with latest security update. I do not know what went wrong, but after installing "Security Update 2006-002 (PowerPC)" (1.0) on 2006-03-14 15:52:40 +0100: with Software Update from Tiger, my desktop (and probably not only desktop) is damaged.
    The most visible thing is that all .html and .htm documents on my desktop does not have Safari icon anymore, they have some 'blank' icon and doubleclick on them DOES NOT start-up Safari, why?
    See here on the screenshot: http://www.jirkacech.com/files/Tiger-problemy-screeshot.png
    note blank "apple - start.webarchive" also the Safari itself have somehow damaged icon, to same blank thing with triangle, possibly some 'generic app' or 'default.app' icon. It sits in the dock on 5th from left...(dont worry about real safari icon, that's newly added by me)
    Also, on, second screenshot, http://www.jirkacech.com/files/Tiger-problemy-2.png you see that safari itself have some strange icon.
    I am getting crazy, since I do not know what else is broken by last update.
    I have tryed to repair permissions at least 3x, and also run update_prebindings and reboot, delete all system and user caches, and reboot.
    Whole issue is system-wide, not only for one user.
    iBook G4   Mac OS X (10.4.5)   1.33 GHz, 512 MB, 12-inch

    The first thing you can try, if this is limited only to Safari icons, is to select on such icon, then press COMMAND-I to open the Get Info window. In the Open With section select Safari from the dropdown menu as the default app. Then click on the Change All button.
    If this doesn't resolve the problem or if the problem extends to other appicons as well, then you may have some disk corruption resulting from not repairing the hard drive and permissions before doing the update. I suggest you do that:
    Boot from your Tiger DVD. After the installer loads select Disk Utility from the Utilities menu. After DU loads select your OS X volume from the list on the left, click on the First Aid tab, then click on the Repair Disk button. If DU reports any errors that have been fixed, then re-run Repair Disk until no errors are reported. If no errors are reported click on the Repair Permissions button. Wait until the operation completes, then quit DU and return to the installer. Now shutdown the computer for a couple of minutes and then restart normally.
    If DU reports errors it cannot fix, then you will need Disk Warrior (3.0.3 for Tiger) and/or TechTool Pro (4.1.1 for Tiger) to repair the drive. If you don't have either of them or if neither of them can fix the drive, then you will need to reformat the drive and reinstall OS X.

  • Security Update 2006-007 (Power PC) wiped out my Airport

    last night i figured i'd download and install the updates sitting in my software update queue, one of which was the Security Update 2006-007 (Power PC). among the things it states it improves the security for is Airport. after the download finished i restarted to find that my internet connection was absent. in addition my Airport indicator in the menu bar was greyed-out. however my network was still listed underneath and i selected it believing it would log back on to my network. nope. i've tried to run Airport Admin Utility, but it doesnt even see an Airport Base Station to talk to! (as an aside, i don't know how that is possible since i can obviously see my network under the Airport menu icon). i've also tried unplugging my Airport and internet connection to no avail.
    my computer that is hardlined to the Airport can still get an internet connection so its nothing going awry with the internet or the Airport. its specifically something that got changed on my laptop from this "security" update. as well as not being able to connect to the internet, i also cannot access any other computer on my network from my laptop.
    i'm sure that this will eventually get resolved, but my question is how can this happen? this is an apple-backed security update! and it wipes out my Airport connection? how is that possible? this does nothing for my confidence in keeping current with these security updates and installing them. which then makes me prone to potential holes in the future. i'm a web designer and macs and computers are hardly my weak suit. i can't imagine if this was happening to someone who just uses their computer to check their email or surf the internet, such as my dad. how confounding this must be to someone like that. you had the internet, updated your security, then you dont have the internet. makes no sense. its a total microsoft move.
    PowerBook G4 Mac OS X (10.3.9) Security Update 2006-007 (Power PC)

    littleorangeman,
    Take a look at the following article. Sounds like you may need either a hard or factory reset of your airport express.
    If you do a factory reset, you'll have to set it up like a new airport--pretty easily done.
    http://docs.info.apple.com/article.html?artnum=108044
    Hope this helps,
    Bob

  • Security Update 2006-006 can't be intalled

    My is ibook Mac OX 10.3.9
    I use the update to download Security Update 2006-006.
    Security Update 2006-006 is about 29.8MB,update still downloaded the file when it more than 29.8mb,actually, it stopped download until 40.7mb,
    and the update couldn't install it because can't run the Security Update 2006-006 which had been downloaded.
    I went to www.apple.com/support/downloads site to download the full files .
    When run it, still can't intall it.
    Please give any advice how to deal with it.
    Thank you ,Sir!

    Welcome To Discussions lauren0115!
    You wrote "I use the update to download Security Update 2006-006."
    Do you mean that you used the automatic Software Update feature on your system?
    "...it stopped download until 40.7mb,..."
    Does this mean that downloaded file was 40.7 MB?
    "I went to www.apple.com/support/downloads site to download the full files ..."
    Is this Security Update 2006-006 (10.3.9 Client), what you downloaded?
    If so, how many MBs was the download, when finished?
    ali b

  • Problem with Security Update 2006-002

    I have downloaded and installed the latest security update (2006-002) on my iBook running 10.3.9. As a result apparently all my Keychain related functionality is gone: Keychain Access blocks forever trying to display the password of an entry, and, more annoying, all possibility of connecting to my WiFi network (WEP key) is also gone.
    I recreated a default Keychain, and tried to log on to the wifi network: the password dialog blocks forever here too.
    I tried to track down what are the components changed by 2006-002, and the list is really long (I'm lost in there). The only indice I have about the problem is my Library/<myusername>/console.log where I have entries of the type:
    Keychain Agent [318] NSKeychain is now obsolete!
    Keychain Agent [318] NSKeychainItem is now obsolete!
    Keychain Agent [318] NSKeychainSearch is now obsolete!
    I suspect some libraries have been changed by the update but my keychain software hasn't.
    Does anybody knows of a workaround? I'll backup and reformat/reinstall 10.3 tomorrow (after buying a pack of CDRs) but I'm rather annoyed to have to spend one or two days downloading and reinstalling all the software I need.

    Thierry,
    Great!
    A lot of individuals (myself included) believe that repairing permissions before and after an update will keep problems from ocurring.
    Glad it worked for you!
    Bob

  • Problem with CD drive after Security update 2006-004

    I just updated my emac, running 10.3.9 with security update 2006-004. Now, my CD drive will not stay closed when a cd is inserted. If I remove the cd, the drawer will stay close, but when I insert a cd (any kind music, game...) it close momentarily then spit it back out.

    drtom,
    Welcome to the Apple Discussions!
    Did you get the security update via Software Update or as a stand-alone download?
    Does the CD eject itself if you logon to a different user account?

  • Security update 2006 v1.1

    The Security Update 2006 v1.1 has been released but the automatic update of Mac OS X don't propose anything to do!!! Should i do the update with the file present in the section "download" in Apple website?? or maybe this update don't concern my computer???
    PS : I have done the first security update properly (the update just previous the v1.1)

    The ability to launch Safari is not a 100% accurate method for checking if Safari has been patched with Security Update 2006-002 (v1 or v1.1).
    I am one of the users that needed the v1.1 update, because I had moved Safari into a sub folder. However, after patching with the version 1 updater, I was still able to use Safari without difficulty, by launching from the dock, which is the method I use 100% of the time.
    It was only this morning when I realized that the v1.0 and the v1.1 update didn't patch the Safari version.
    The symptoms of an unpatched Safari version are:
    1. Links from Mail.app won't launch Safari. They will open a new window if Safari is open.
    2. A 2.1 MB Safari app is in the Applications folder, but when clicked, does nothing.
    3. A 28 MB Safari app is in your subfolder (where you moved it), but isn't version 417.9.2.
    No doubt, this is due to me failing to RTFM. But, Apple should simply have made the v1.1 updater look for a 2.1 MB Safari.app application in the Application folder, and trash it, or at a minimum notify the user with a pop-up message, IMHO.
    So, Riad, if you want to be assured that your Safari.app is patched, you should launch it, and select Safari->About Safari and verify the version is 417.9.2 (on Intel...don't know if the version is the same for PPC).
    iMac Duo 20" | 2 GB | 256 MB Video   Mac OS X (10.4.5)   Smokin' fast and sweet

Maybe you are looking for

  • Customer conversion for non-english language

    Hi: We have a requirement to convert customer data from lagacy system to Oracle EBS supporting English and Non-English languages. Our conversion programs for english is working fine but we are not sure about the approach for other language converions

  • Quicktime 7 crashes

    Hello. I recently upgrade my intel iMac to Lion- 10.7.5. Now whenever I try to open quicktimes in QT 7 pro, it immediatly crashes. However, they do play in QT X. Any suggestions? thanks

  • Calling BPM web service

    Hi expert, we have two instance in our production. web service are implemented in both instance, which is generated by the bpm for triggering the process http://instance1.demo.com/bpm/update/process/StartProcessIn?wsdl&mode=ws_policy http://instance2

  • Lion and photoshop/ error message /Library/Application Support/Adobe/Adobe Version Cue CS4/Client/4.0.0/VersionCue.framework

    /Library/Application Support/Adobe/Adobe Version Cue CS4/Client/4.0.0/VersionCue.framework I cannot use photoshop CS4 on my new computer that came with lion. I get this message above Help.

  • CS5 not opening up. (Kubota plugin bug)

    When I try to open photoshop on it's own or by using Bridge it just brings up the blue box and then it just sits there. I have had to force quit many times on my MAC. I have restarted my computer. I checked all of my updates and they are all current