Security Update 2006-001, Mail, and Starbucks

Anybody else having a problem with Mail becoming erratic since the latest security update? I'm fine at home as far as I can tell but while using the T-Mobile HotSpot at Starbucks Mail takes forever to open the mailbox, sent mail will briefly appear in the Sent box (if it goes out at all) and then quickly disappear and it never does completely open the INBOX.
PowerMac G5 Dual 2.5Ghz; 15"   Mac OS X (10.4.2)  
PowerMac G5 Dual 2.5Ghz; 15" G4 Powerbook   Mac OS X (10.4.5)  

The secuirty update seems to be affecting both Mac Mail and Entourage. A temporary solution for email users connecting VIA IMAP would be to use Thunderbird at this time. Until Apple comes out with a fix for this, there should be a lot of errors that you will experience. Mainly being kicked offline, but when running entourage you will also notice messages coming in as deleted, and then removed from the server. The safest solution for now is Thunderbird. Try it out. Hopefully the guys over at the software department have figured out that they royally messed up, and will have a fixed update for this shortly.
I'm not exactly sure where the port 587 comes into play with IMAP, as it has nothing to do with it. You can try connecting via SSL and changing the incoming port to 993 if your service provider has this option. Also, changing the root to Inbox doesn't seem to help. It doesn't look like a server issue, but a Mac Mail/Entourage issue with connecting to them.
Intel 1.83 IMAC / G5 PPC Dual Core 2.0   Mac OS X (10.4.6)  

Similar Messages

  • Menu Bar Icons Disappeared and other issues after Security Update 2006-001

    Hi,
    I was really affraid when i've heard about the Safari vulnerability, so I was really happy to see the Security Update 2006-001.
    But after installing it, I'm having regrets:
    * mouse speed turned to default settings
    * system preferences crashes when i try to access to Mouse & Keyboard
    * all the menu bar icons disappeared: Bluetooth, Airport, Time, EVEN Spotlight
    * Finder is slower...
    I've repaired disk permissions but: nothing happens....
    What should I do please?
    Should I wait?

    How did you fix it? I'm having the same problem
    myself.
    Mandy,
    I'm gonna tell you a secret, just like i said my problem wasn't due to the Security Update but because of Front Row.
    How? Because, I've hacked my iMac (without iSight) to install FrontRow (with an update), and i've installed the Security Update at the same time. Restarted my computer, and thought the problem was due to the Security Update.
    If you did the same thing, here's the trick to remove Front Row:
    Delete Front Row (/System/Library/CoreServices/Front Row.app)
    Install/reinstall the the latest Mac OS X Update Combo.
    This article assumes you haven’t tried installing Front Row before without the use of Enabler. If you have used one of the very early versions of Front Row (ones installed without Enabler):
    Delete Front Row (/System/Library/CoreServices/Front Row.app)
    Delete the preference file (/System/Library/LaunchAgents/com.apple.frontrow.plist)
    Remove any Login Items that launch Front Row (System Preferences >Accounts >User >Login Items)
    Disable any shortcuts managed by third-party applications that launched Front Row.
    Reboot and reinstall.

  • Focus switch to finder after Security Update 2006-001

    Just updated with Security Update 2006-001 on PB G4 running 10.4.5.
    While running Safari or Mail or any App. and not using the app (like when reading a webpage or mail message) the focus of the OS switches to the Finder after about 10 seconds or so. So in the top menubar right from Apple icon the OS switches from Safari or Mail to Finder.
    Moving the mouse does not make any difference. i.e does not prevent or delay the switch.
    Clicking on the application window returns focus to that application (Safari or Mail).
    Anyone?

    thanks for the input. did not resolve the probelm though. finder started to crash every 2 minutes.
    but on the bright side: its a user thing. my guest account was not affected.
    so i trashed most of my prefs. that resolved the finder problem.
    currently working on restoring my prefs & email accounts, oh well

  • Did Security Update 2006-001 kill SpamAssassin 3.1.0?

    Greetings,
    It appears Apple's Mac OS X 10.3 (Panther) Security Update 2006-001 has killed my SA 3.1.0. After the update, upon starting spamd this is what happens:
    Mar 3 14:05:00 localhost spamd[15757]: spamd: server started on UNIX
    domain socket /tmp/spamd.sock (running version
    3.1.0-agsvsoft_2005102101)
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server pid: 15757
    Mar 3 14:05:01 localhost spamd[15759]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15759
    Mar 3 14:05:01 localhost spamd[15760]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15760
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:01 localhost spamd[15762]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15762
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15763]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15763
    Mar 3 14:05:01 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15759 due to SIGCHLD
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15764]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15764
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:01 localhost spamd[15765]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15765
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:02 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15762 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15760 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15763 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15764 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15766]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15766
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:02 localhost spamd[15767]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15767
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:02 localhost spamd[15768]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15768
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:02 localhost spamd[15769]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15769
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:03 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15765 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15767 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15766 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15768 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15770
    Mar 3 14:05:03 localhost spamd[15770]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:03 localhost spamd[15771]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15771
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:03 localhost spamd[15772]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15772
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:04 localhost spamd[15773]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15773
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:04 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15769 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15772 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15770 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15771 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15774]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15774
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:04 localhost spamd[15775]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15775
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:04 localhost spamd[15776]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15776
    Mar 3 14:05:05 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15773 due to SIGCHLD
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:05 localhost spamd[15777]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15777
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    [snip]
    Has anyone else seen this? I note from the release notes:
    perl
    CVE-ID: CVE-2005-4217
    Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9
    Impact: Perl programs may fail to drop privileges
    Description: When a perl program running as root attempts to switch to another user ID, the operation may fail without notification to the program. This may cause a program to continue to run with root privileges, assuming they have been dropped. This can cause security issues in third-party tools. This update addresses the issue by preventing such applications from continuing if the operation fails. This issue does not affect Mac OS X v10.4 or later systems. Credit to Jason Self for reporting this issue.
    Any advice would be most appreciated.
    Cheers,
    Damon
    PowerMac G4-867   Mac OS X (10.3.9)  

    The update prevents spamd to run as the default user "nobody". Running it as root seems to be the only workaround.

  • Downloading Security Update 2006-001 STOPS (!) my internetconnexion

    NO idea what this is: everytime I want to install new iTunes or Security Update 2006-001 , my internetconnexion falls out. Only then! After resetting router and modem all works fine again, but then when I want to install new iTunes or Security Update it happens again...?????
    I work on iMac G5 -10.4.5
    Anyone has an idea WHAT TO DO?? xxxTHANKS!xxx

    Welcome to Apple Discussions!
    Yes the same happened to me until my regular suggestion of repairing permissions solved it. Applications -> Utilities -> Disk Utility is where you select the hard disk and from First Aid repair permissions. For more upgrading tips, see this article which I wrote:
    http://www.macmaps.com/upgradefaq.html
    Disclaimer: Reference to links I make to my Macmaps.com website are a for your information only type reference. I do not get any profit from this page, and it is open to the public.

  • Security Update 2006-001 - The return?

    Hello!
    According to my software update which popped up after waking the computer I should install the latest security update (PowerPC), even though I installed it just a couple of days ago. Or, that's what I think...
    Should I just go ahead and install this 'second edition' too, or is there a way to check if the first update was installed properly (and to check that it actually happened)?
    Thank you!
    PowerBook G4 Aluminum   Mac OS X (10.4.5)  

    I installed security update 2006-001 last week and my SU shows nothing futher. And further, there is nothing further. Either your SU prefs are corrupted or it did not install properly.
    Look in /library/receipts to verify that you have that receipt.
    -mj
    [email protected]

  • Security Update 2006-001 Killed network preferences

    After upgrading with the 2006-001 Security Update, none of my network preferences will set up correctly anymore. DHCP doesn't seem to be doing anything, and when I tell it to use a manual address via the system preferences, it appears that it's not actually doing anything. Mac OS System Preferences will not even detect that I have an ethernet cable plugged in, though if I use ifconfig and route I can get a LITTLE bit of traffic to go out, so I know it's connected and working.
    Any one have any ideas on this? Absolutely frustrating because I can no longer work until this is fixed (sitting in an internet cafe trying to figure out what the problem is). I'm running 10.3.9 on a 1.2Ghz 12" Powerbook. I don't remember my Unix days well enough to try to manually set up routes and our DNS settings, nor do I know if the appropriate tools are in Mac OS, but the Apple network preferences are clearly busted.
    Is there anyway to uninstall an update?
    Patrick
    12" 1.2 Ghz PB   Mac OS X (10.3.9)  

    I had the same Network & Airport issue after installing Security Update 2006-001 on my wife's iBook G3 running 10.3.9 Trying to access our Airport base station wirelessly would inevitably hang as I selected the Airport network.
    I noticed that every time I shut down the computer there was a brief showing of the keychain window asking to allow keychain access...this right as the computer went down (no chance to hit the allow button).
    Spent the better part of an entire afternoon trying to fix this problem. Then read all the posts here (amazing how many people have problems with this update). Tried to reset permissions - didn't work. In the end, I rebooted the Airport...went into the Airport Admin Utility with my PowerBook to fiddle around...removed our Airport network from the keychain in my wife's iBook...explored other aspects via the keychain access utility.
    None of that seemed to work. I also figure I reset the permissions about half a dozen times (with subsequent reboot). None of that was working either...until after one permissions reset & reboot things came good. I got the keychain window, allowed access, and hey presto...online. So far it's been OK for over 12 hours (including after reboot).
    What exactly worked? I don't know. "It's a mystery".
    One thing's for sure...this update is not going on any of my other machines!
    Come on Apple...surely you can do better than send us automatic updates that break our computers and sap our time!
    iBook   Mac OS X (10.3.9)  

  • After applying Security Update 2006-001 can't launch Office X apps

    I noticed that, after applying Security Update 2006-001, I can't launch Microsoft Word nor Excel nor Power Point (Office X, 10.1.6 updated). If I double click the app icon, select and try to open from File menu or try to launch it from the Dock, I get the message "The app has unexpectedly quit". This does not affect Entourage so far. I can open existing files double clicking on their icons and, once the app is running, create new files from menu bar. Repaired permissions, checked for corrupted preferences files or templates but to no avail.
    Can anybody help?
    iBook G4   Mac OS X (10.3.9)   512 MB RAM

    DivX Doctor is a freeware I had downloaded a few days before applying Security Update 2006-01 (http://www.macupdate.com/info.php/id/4683). It certainly was responsible for my problems with Office X apps because, as I said, they completely disappeared as soon as I got rid of it.
    I hadn't the memory problems you mentioned (I've applied also Security update 2006-02 without problems).
    Don't know if this can help, but you might want to give a try to Disk inventory X (http://www.macupdate.com/info.php/id/14393) [quote]Disk Inventory X is a disk usage utility for Mac OS X. It shows the sizes of files and folders in a special graphical way called "treemaps".
    If you've ever wondered were all your disk space has gone, Disk Inventory X will help you to answer this question.[/quote]
    Once DiskWarrior fixed a problem with free hard disk space on my machine, even though a small one.
    iBook G4    

  • Security Update 2006-001 causes huge loss of memory

    After running Security Update 2006-001 and updating Garageband, iPhoto and iTunes, per Software Update, my available GB of memory was reduced from approximately 110 to about 35! Yikes! What could have caused this, and how can I fix it?

    Don't confuse memory & hard drive space. Running applications uses memory; storing files (application or document) use hard drive space. If you run memory-hungry apps, you may need to increase the RAM in your Mac to avoid slowdowns due to your Mac swapping data in memory (RAM) out to the hard drive. If you don't have adequate hard drive space to spare for this (usually 5 GB minimum, or 10% or more of your hard drive's free space), you may get crashes or other problems.
    In any case, deleting files (from the hard drive) won't change the amount of memory (RAM) your Mac uses. That is controlled by the OS, in response to the demand of the application(s) you run. OS X has very good memory management; generally, all you will see is slowdowns if the demand is greater than the installed RAM can handle.
    Are you seeing any problems, or are you just concerned that memory use is higher than you expect?

  • Apple Releases Security Update 2006-004 (PowerPC and Intel)

    From Macfixit................
    Apple has released Security Update 2006-004 for Mac OS X in both PowerPC and Intel versions. This update requires Mac OS X 10.4.7 for either PowerPC or Intel, Mac OS X 10.3.9 or Mac OS X 10.3.9 Server.
    This is the fourth major standalone security update for Mac OS X released this year.
    Update procedure recommendation First, avoid performing any other operations (in Mac OS X or third-party applications) while the update process is occurring. In addition, before installing this security update, make sure all Apple-installed applications and utilities are in their original locations. Moving one of these applications to a different location on your hard drive can lead to an incomplete update. Also, disconnect any FireWire/USB devices before applying the update (except for your startup drive, if it is FireWire or USB, and your keyboard/mouse), then re-connect the devices one by one (checking for issues created by any particular device) after the update process is complete and the system has restarted.
    Enhancements in this release
    Of most interest to general end-users:
    a fix that prevents maliciously crafted Zip archives from causing condition where arbitrary code can be execute. In other words, prior to Security Update 2006-004 you could download a specially crafted file ending in .zip from a Web site or other location, and it could trigger the execution of malicious code.
    a fix that disallows maliciously crafted Canon RAW images from creating a buffer overflow, potentially leading to arbitrary code execution. Prior to Security Update 2006-004, you could download or otherwise receive a Canon RAW file that could allow execution of malicious code on your system.
    similar to the above, a fix that prevents maliciously crafted GIF images from causing an integer overflow, potentially leading to arbitrary code execution.
    new download validation that will catch certain HTML files defined by Safari as "safe" that may actually contain malicious JavaScript code. After applying Security Update 2006-004, these files will not be automatically opened.
    Protection against maliciously crafted HTML documents that can also open the door for arbitrary code execution by accessing deallocated objects.
    A full list of enhancements is as follows:
    AFP Server
    An issue in the AFP server allows search results to include files and folders for which the user performing the search has no access. This may lead to information disclosure if the names themselves are sensitive information. If the permissions of the items allow it, the contents may also be accessible. This update addresses the issue in Mac OS X v10.3.9 by ensuring that search results only include items for which the user is authorized. For Mac OS X v10.4 systems, the issue was addressed in Mac OS X v10.4.7. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9:
    The AFP server contains an integer overflow that can be triggered by an authenticated user. A malicious user with access to the AFP server may be able to cause a denial of service attack or arbitrary code execution with system privileges. The AFP server is not enabled by default on Mac OS X. This update addresses the issue by performing additional validation. Credit to Dino Dai Zovi of Matasano Security for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    On Mac OS X Server, the AFP server supports reconnection of file sharing sessions after a network outage. The storage of reconnect keys is world-readable. It may be possible for an authenticated local user to read the reconnect keys, use them to impersonate another user over AFP, and access files or folders with the privileges of the impersonated user. This update addresses the issue by protecting the reconnect keys with appropriate file system permissions. This issue only affects Mac OS X Server. Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.7.
    An unchecked error condition exists in the AFP server that may lead to a crash. By carefully crafting an invalid AFP request, an attacker may be able to trigger this condition and cause a denial of service. This update addresses the issue by handling the formerly unchecked error condition. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bluetooth
    The security of the Bluetooth Setup Assistant has been improved in this update for Mac OS X v10.4.7. The length of the automatically generated passkey used for pairing has been increased from six characters to eight characters. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bom
    An issue in Bom's compression state handling may cause heap corruption. By carefully crafting a corrupt Zip archive and persuading a victim to open it, an attacker may be able to trigger this condition which could lead to an application crash or arbitrary code execution. Note that Safari will automatically open archives when "Open `safe' files after downloading" is enabled. This update addresses the issue by properly handling such malformed Zip archives. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    DHCP
    A stack buffer overflow exists in bootpd's request processing. By carefully crafting a malicious BOOTP request, a remote attacker may be able to trigger the overflow and cause arbitrary code execution with the privileges of the system. Note that bootpd is not enabled by default in Mac OS X, and must be manually configured in order to be enabled. This update addresses the issue by performing additional bounds checking. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    dyld
    Malicious local system users may specify dynamic linker options that cause output to standard error. This output contains informational content and potentially user-specified content. As a result, privileged applications that parse or reuse standard error may be influenced inappropriately. This update addresses the issue by ignoring the problematic dynamic linker options in privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    An improperly handled condition in the dynamic linker may lead to including dangerous paths when searching for libraries to load into privileged applications. As a result, malicious local users may cause the dynamic linker to load and execute arbitrary code with elevated privileges. This update addresses the issue by properly selecting search paths when executing privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    fetchmail
    Several issues in the fetchmail utility were discovered. The most serious issue could lead to arbitrary code execution when fetching mail from a malicious POP3 mail server. All issues are described at the fetchmail website (fetchmail.berlios.de). This update addresses the issues by updating fetchmail to version 6.3.4. In addition, fetchmail is no longer distributed as a privileged utility. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    gunzip
    A race condition may allow a malicious local user to modify the permissions of files owned by another user executing gunzip. This issue is only exploitable when executing gunzip on files in directories that are modifiable by other users. This update addresses the issue by properly handling files while decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    A directory traversal vulnerability is present in the command line utility gunzip when it is used with the non-default "-N" option. By carefully crafting a malicious compressed file and persuading a user to open it with "gunzip -N", an attacker may replace or create arbitrary files with the privileges of the victim. This update addresses the issue by properly stripping paths from files when decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Image RAW
    By carefully crafting a corrupt Canon RAW image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Canon RAW images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    ImageIO
    By carefully crafting a corrupt Radiance image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Radiance images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    By carefully crafting a corrupt GIF image, an attacker can trigger an undetected memory allocation failure which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    By carefully crafting a corrupt GIF image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    LaunchServices
    Download Validation may erroneously identify certain files containing HTML as "safe". If such a file is downloaded in Safari and Safari's "Open `safe' files after downloading" option is enabled, the HTML document will automatically be opened from a local URI. This would allow any JavaScript code embedded in the document to bypass access restrictions normally imposed on remote content. This update provides additional checks to identify potentially malicious file types so that they are not automatically opened. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    OpenSSH
    Attempting to log in to an OpenSSH server ("Remote Login") using a nonexistent account causes the authentication process to hang. An attacker can exploit this behavior to detect the existence of a particular account. A large number of such attempts may lead to a denial of service. This update addresses the issue by properly handling attempted logins by nonexistent users. This issue does not affect systems prior to Mac OS X v10.4. Credit to Rob Middleton of the Centenary Institute (Sydney, Australia) for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    telnet
    When connected to a TELNET server, the client may send the contents of arbitrary environment variables to the server if the server requests them. Some environment variables may contain sensitive information that should not be sent over the network. This update addresses the issue by ensuring that only non-sensitive variables and variables that the user has explicitly requested are are shared with the server. Credit to Gael Delalleau and iDEFENSE for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    WebKit
    A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. This update addresses the issue by properly handling such documents. Credit to Jesse Ruderman of Mozilla Corporation for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    AppKit, ImageIO
    Buffer overflows were discovered in TIFF tag handling (CVE-2006-3459, CVE-2006-3465), the TIFF PixarLog decoder (CVE-2006-3461), and the TIFF NeXT RLE decoder (CVE-2006-3462). By carefully crafting a corrupt TIFF image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of TIFF images. Systems prior to Mac OS X v10.4 are affected only by the TIFF NeXT RLE decoder issue (CVE-2006-3462). Credit to Tavis Ormandy, Google Security Team for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7./

    Right after installing Security Update 2006-004 (Intel) on my macbook pro I am having troubles with my wireless connectivity. Here is the dump from the console:
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    I can reboot and it will work, but if I put my macbook to sleep it, when I wake it, it will do the same thing again.
    I am also getting timeouts waiting for results of 1st wireless scan to complete in console.
    Anyone else having this issue?
    MBP15-2GHZ   Mac OS X (10.4.7)  

  • Security Update 2003-001 slows and freezes Lion!

    Is Security Update 2003-001 only for Mountain Lion? I am running 10.7.5 regular Lion and now am having extremely slow startups, having to reboot multiple times to suffer and get system freezes. My Mac problems only began after installing Security Update 2003-001, so that's why I wonder if the update requires Mountain Lion in spite of the download being offered in Software Update in regular Lion.
    I have thoroughly checked my entire drive down to the sector level with professional software and Disk Utility, including fixing permissions. Can anyone help me?

    Thanks for reading this post, but I have probably resolved this problem. Probably. I worked out what programs were stuck running on startup and were gobbling up the lion's share of system resources (pun intended). After pruning out unneccessary startup items and finally installing Mountain Lion, the worst culprit seems to be my copy of Dropbox, who was madly trying to re-make an index of my internal drive for no apparent reason.
    After rebooting with the shift key held down, I consulted the official Dropbox site's forums to find that uninstalling a spontaneously damaged Dropbox, reinstalling and reconnecting to the existing Dropbox account was in order. That, with my previous pruning, seemed to do the trick.
    So far. I hope my tale helps others.

  • Safari won't start after installing security update 2006-001

    today i updated my computer with the latest Security patch. Now my computer wont start the browser
    i deleted the preference file on my preferences folder to try to solve the problem, but i still wasn't able to start the browser.
    i created a new user and tried to start safari once more, but still the progam crashes before it even starts.
    this is the output that i get from the crash reporter
    Date/Time: 2006-03-02 16:44:55.777 -0500
    OS Version: 10.4.5 (Build 8H14)
    Report Version: 4
    Command: Safari
    Path: /Applications/Safari.app/Contents/MacOS/Safari
    Parent: WindowServer [63]
    Version: 2.0.3 (417.8)
    Build Version: 1
    Project Name: WebBrowser
    Source Version: 4170800
    PID: 445
    Thread: 0
    Exception: EXCBADINSTRUCTION (0x0002)
    Code[0]: 0x00000002
    Code[1]: 0x95aadd70
    ... also the Sofware update softare wont start. It will crash before it even starts.
    this is the output from the crash reporter
    Date/Time: 2006-03-02 16:43:46.431 -0500
    OS Version: 10.4.5 (Build 8H14)
    Report Version: 4
    Command: Software Update
    Path: /System/Library/CoreServices/Software Update.app/Contents/MacOS/Software Update
    Parent: WindowServer [63]
    Version: 2.0.5 (2.0.5)
    Build Version: 24
    Project Name: SoftwareUpdate
    Source Version: 1360000
    PID: 439
    Thread: 0
    Exception: EXCBADINSTRUCTION (0x0002)
    Code[0]: 0x00000002
    Code[1]: 0x95aadd70
    any ideas how to fix it?
    Powerbook G4 12" 1.5GHz   Mac OS X (10.4.5)  

    - FOR OS VERSION UPDATES YOU CAN ROLL THEM BACK
    have to trash the UPDATE10.4.?.PKG file that is located in:
    Hard drive> Library> recipts folder> ??.pkg file. (check spotlight search if you cant navigate to the Recipts folder for .pkg files to take out the one for the latest update you have done.
    Basically the only way to "roll back" any applications or drivers that are updated is to do an entire Archive and Install of your OS (can do preserving user and network settings and WILL NOT LOOSE ANY DATA) see knowlege base article 107120 for A&I how to. You can always do the software updates later after the A&I.
    That particular security update may have been faulty so of course, mabye try the DL again to see what happens and by all means CHECK THE SUPPORT TAB of this site for software updates if you want to do them. IF IT AINT BROKE, DONT FIX IT. most software updates do little or nothing for the application and somtimes they could cause problems LIKE loosing your itunes library when going from 5.0 to 6.0 and so on...

  • Security Update 2006-001 causing a problem?

    I just installed the new security update on my work mac. The result after the resart was that all of my programs act like they've never been opened before. My address book is gone, my mail started over, Firefox, iTunes, etc. Along with this went my desktop. Is there a fix to this or am I stuck? I'm afraid to recommend to others in my department to do the security upgrade at this point.
    Thanks for any help.
    Mac G5   Mac OS X (10.4.5)  

    Thank you so much for the kind welcome and helpful suggestions!
    The apple.com reference was helpful in that it described a very similar result, but after the restart, I logged in as usual. In the users folder of the computer I have a "home" icon with my user name which seems empty. In the side menu of the window where my "home" icon would be is a folder with my same user name. This has my files - even the desktop but in a folder.
    Thanks again. I'm going to try this suggestion to see if it will still solve the problem.
    Mac G5 Mac OS X (10.4.5)
    Mac G5 Mac OS X (10.4.5)

  • Security Update 2006-001

    Ever since I processed the Security Update in the subject line I haven't been able to listen to any of my streaming audio (radio feeds via any Mac browser), for instance < <a class="jive-link-external-small" href="http://">http://www.insinc.com/team1040/20040823/index_20050130.htm > or < <a class="jive-link-external-small" href="http://">http://www.cknw.com/shared/coruscontent/corusplayer/index.aspx?rem=cknwam >. I get a message " Cannot open the file. Verify path and filenameare correct and try again". Try as I might I can't get the media to play! Thanks for any of your ideas!

    I found the first link doesn't work on 10.4.3 either, and it looks like the kind of problem that has to do with problems on the server end, not the Mac end.
    The second link does work on a machine that has the security update applied. Make sure that your version of safari is 2.0.3 (417.8), and that your Windows Media Player is the latest version. If you have installed, the Flip4mac Windows Media Player plugin, make sure it too is the latest version. I actually ended up uninstalling that plugin as it interfered with my EyeTV playback. Maybe that's why the website still works on my Mac.

  • Apps open in Script Editor after Security Update 2006-001 Mac OS X 10.4.5

    Several applications, notably "MathGo 2.2", no longer open when double clicked. Instead they open in a Script Editor window (after informing me they are not scriptable).
    It is as if Finder no longer recognizes them as applications! "Get Info" shows them as still being apps however.
    I can work around this by using AppleScript to launch them: "tell application "HD:Applications:MathGo 2.2:MathGo 2.2" to activate" but that's kind of a pain.
    Anyone else having problems like this? I'm certain it is tied to security update because I have an another start-up drive without the latest security update. These apps still run correctly when double clicked on that system.

    The Finder gets easily confused, who knows why, by applications whose name ends in a "." and something other than the extension "app"--it manages to get confused even without the latest Security update. There are those who have one account where "GreatApp 2.1" launches without a hitch, and another account where it doesn't. The easiest thing to do is do GetInfo on the application, and rename it to "GreatApp21.app"--it should then work fine.
    Francine
    Schwieder

Maybe you are looking for