Security Update 2006-006

I just updated software with Security Update 2006-006 and now can not log into AIM, or send mail using Eudora, or Apple Mail. I can access the internet and receive mail. Anyone else hear of problems -- and who do I complain to?
iMac   Mac OS X (10.3.9)  
iMac   Mac OS X (10.3.9)  

sundance2548,
First of all, Welcome to Apple Discussions Forums!
You did not state if you Repaired Permissions using Disk Utility from your HD before and after downloading the update which is an important consideration if you had a problem post download.
If not, run Repair Permissions from your HD Disk Utility>First Aid tab>Repair Permissions and see if it helps.
Security updates can wreak havoc on apps such as Apple Mail and iChatAV (sorry I don't use Eudora so I can't address that) but "usually" only if one has not Repaired Permissions before and after the Software Update.
I had trouble with one Security Update and it was due to not Repairing Permissions.
I won't pretend to know the ins and outs of how Security Updates interact with the stated applications when installed but I know that if you are prudent and make sure to Repair Permissions (with any update before and after) you normally should have no problems.
That said, problems can also be caused by conflicting third party software. That is where I would look next if still no luck.
littleshoulders [:-)

Similar Messages

  • Security Update 2006-006 can't be intalled

    My is ibook Mac OX 10.3.9
    I use the update to download Security Update 2006-006.
    Security Update 2006-006 is about 29.8MB,update still downloaded the file when it more than 29.8mb,actually, it stopped download until 40.7mb,
    and the update couldn't install it because can't run the Security Update 2006-006 which had been downloaded.
    I went to www.apple.com/support/downloads site to download the full files .
    When run it, still can't intall it.
    Please give any advice how to deal with it.
    Thank you ,Sir!

    Welcome To Discussions lauren0115!
    You wrote "I use the update to download Security Update 2006-006."
    Do you mean that you used the automatic Software Update feature on your system?
    "...it stopped download until 40.7mb,..."
    Does this mean that downloaded file was 40.7 MB?
    "I went to www.apple.com/support/downloads site to download the full files ..."
    Is this Security Update 2006-006 (10.3.9 Client), what you downloaded?
    If so, how many MBs was the download, when finished?
    ali b

  • Question Regarding Security Updates 2006-005 and 2006-006?

    Okay I just noticed Apple Security Update 2006-005 and 2006-006 are available for download. Has anyone had any problems with these updates? I remember the Security Update 2006-001 was a nightmare for me -- Safari was broken after that update I had to do a complete OS reinstall then re-update to Mac OSZ 10.3.9 Panther and I only want to update if the likelihood of any problems occuring is very slim. Anyone running Mac OS X on PowerPC chips (i.e. using a PowerBook, an older iMac, Mac Mini, PowerMac etc) or on Intel chips (i.e. MacBook Pro, the new iMacs, new Mac Mini's etc) with Mac OS X Panther, Mac OS X Tiger etc having any problems with either update?

    (10.3.9 Client) seems to have broken my CS2 Version Cue after loading Security Update 2006-006 via Software Update - 27MB or something.
    Though afterwards all apps (Illustrator 12.0.1, Acrobat 7.0.8, PS 9.0.1 and InDesign 4.0.4) open and run fine, Version Cue disappeared from the Desktop Menu and System Preferences and says it's no longer installed, all this immediately after loading the Update and restarting.
    Two restarts and a Repair Permissions haven't resolved the issue. I've downloaded the stand alone Update and have run that but without any luck. I'd had no history of any trouble with any Security Update prior to this, and have run good maintenance schedules.
    I've not seen any other posts or related issues to mine, so maybe it's just my isolated event?

  • Since I downloaded Security Update 2012-006 for Mac OS X 10.6 I have been unable to print or upgrade my Quicken 2006.  How can I fix this?  Hurry!  I need to pay my bills. thank you very much

    Since I downloaded Security Update 2012-006 for Mac OS X 10.6 I have been unable to print or upgrade my Quicken 2006.  How can I fix this?  Hurry!  I need to pay my bills.
    thank you very much

    Looks like Apple did the same thing with Lion that Microsoft did with Vista. Brought it on the market before it was ready.
    I run a MacBook Pro and upgrading to Lion caused me two days of trouble and computer crash. Router settings removed and router blocked. Dongle not recognised, you name it.
    In the end, I gave up and using my Snow Leopard installation disk and a Time Machine Backup finally got my computer up and running again. Thanks to Lion, I think I'll stay with OS X 10.6.8 at least it's reliable.

  • Error in downloading security update 2011-006

    Hi good day!
    I cannot download the latest security update 2011-006 to my macbook pro. The message says "security update 2011-006" can't be saved". My internet connetion is working. Can you help me on this? My other concern is that I cannot download to my iPhone 3G S the IOS 5. It always stopped downloading. Are these two things related to each other? Please help.
    Thanks

    Excellent
    So many folks fail to run Disk Utility B4 d/loading or system changes.
    Also wouldn't hurt to do a backup B4 any actions outlined
    ( Had a flu shot earlier today and it knocked me for a loop... I wasn't able to post )
    Let 'er rip and...
    cheers

  • Apple Releases Security Update 2006-004 (PowerPC and Intel)

    From Macfixit................
    Apple has released Security Update 2006-004 for Mac OS X in both PowerPC and Intel versions. This update requires Mac OS X 10.4.7 for either PowerPC or Intel, Mac OS X 10.3.9 or Mac OS X 10.3.9 Server.
    This is the fourth major standalone security update for Mac OS X released this year.
    Update procedure recommendation First, avoid performing any other operations (in Mac OS X or third-party applications) while the update process is occurring. In addition, before installing this security update, make sure all Apple-installed applications and utilities are in their original locations. Moving one of these applications to a different location on your hard drive can lead to an incomplete update. Also, disconnect any FireWire/USB devices before applying the update (except for your startup drive, if it is FireWire or USB, and your keyboard/mouse), then re-connect the devices one by one (checking for issues created by any particular device) after the update process is complete and the system has restarted.
    Enhancements in this release
    Of most interest to general end-users:
    a fix that prevents maliciously crafted Zip archives from causing condition where arbitrary code can be execute. In other words, prior to Security Update 2006-004 you could download a specially crafted file ending in .zip from a Web site or other location, and it could trigger the execution of malicious code.
    a fix that disallows maliciously crafted Canon RAW images from creating a buffer overflow, potentially leading to arbitrary code execution. Prior to Security Update 2006-004, you could download or otherwise receive a Canon RAW file that could allow execution of malicious code on your system.
    similar to the above, a fix that prevents maliciously crafted GIF images from causing an integer overflow, potentially leading to arbitrary code execution.
    new download validation that will catch certain HTML files defined by Safari as "safe" that may actually contain malicious JavaScript code. After applying Security Update 2006-004, these files will not be automatically opened.
    Protection against maliciously crafted HTML documents that can also open the door for arbitrary code execution by accessing deallocated objects.
    A full list of enhancements is as follows:
    AFP Server
    An issue in the AFP server allows search results to include files and folders for which the user performing the search has no access. This may lead to information disclosure if the names themselves are sensitive information. If the permissions of the items allow it, the contents may also be accessible. This update addresses the issue in Mac OS X v10.3.9 by ensuring that search results only include items for which the user is authorized. For Mac OS X v10.4 systems, the issue was addressed in Mac OS X v10.4.7. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9:
    The AFP server contains an integer overflow that can be triggered by an authenticated user. A malicious user with access to the AFP server may be able to cause a denial of service attack or arbitrary code execution with system privileges. The AFP server is not enabled by default on Mac OS X. This update addresses the issue by performing additional validation. Credit to Dino Dai Zovi of Matasano Security for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    On Mac OS X Server, the AFP server supports reconnection of file sharing sessions after a network outage. The storage of reconnect keys is world-readable. It may be possible for an authenticated local user to read the reconnect keys, use them to impersonate another user over AFP, and access files or folders with the privileges of the impersonated user. This update addresses the issue by protecting the reconnect keys with appropriate file system permissions. This issue only affects Mac OS X Server. Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.7.
    An unchecked error condition exists in the AFP server that may lead to a crash. By carefully crafting an invalid AFP request, an attacker may be able to trigger this condition and cause a denial of service. This update addresses the issue by handling the formerly unchecked error condition. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bluetooth
    The security of the Bluetooth Setup Assistant has been improved in this update for Mac OS X v10.4.7. The length of the automatically generated passkey used for pairing has been increased from six characters to eight characters. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bom
    An issue in Bom's compression state handling may cause heap corruption. By carefully crafting a corrupt Zip archive and persuading a victim to open it, an attacker may be able to trigger this condition which could lead to an application crash or arbitrary code execution. Note that Safari will automatically open archives when "Open `safe' files after downloading" is enabled. This update addresses the issue by properly handling such malformed Zip archives. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    DHCP
    A stack buffer overflow exists in bootpd's request processing. By carefully crafting a malicious BOOTP request, a remote attacker may be able to trigger the overflow and cause arbitrary code execution with the privileges of the system. Note that bootpd is not enabled by default in Mac OS X, and must be manually configured in order to be enabled. This update addresses the issue by performing additional bounds checking. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    dyld
    Malicious local system users may specify dynamic linker options that cause output to standard error. This output contains informational content and potentially user-specified content. As a result, privileged applications that parse or reuse standard error may be influenced inappropriately. This update addresses the issue by ignoring the problematic dynamic linker options in privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    An improperly handled condition in the dynamic linker may lead to including dangerous paths when searching for libraries to load into privileged applications. As a result, malicious local users may cause the dynamic linker to load and execute arbitrary code with elevated privileges. This update addresses the issue by properly selecting search paths when executing privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    fetchmail
    Several issues in the fetchmail utility were discovered. The most serious issue could lead to arbitrary code execution when fetching mail from a malicious POP3 mail server. All issues are described at the fetchmail website (fetchmail.berlios.de). This update addresses the issues by updating fetchmail to version 6.3.4. In addition, fetchmail is no longer distributed as a privileged utility. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    gunzip
    A race condition may allow a malicious local user to modify the permissions of files owned by another user executing gunzip. This issue is only exploitable when executing gunzip on files in directories that are modifiable by other users. This update addresses the issue by properly handling files while decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    A directory traversal vulnerability is present in the command line utility gunzip when it is used with the non-default "-N" option. By carefully crafting a malicious compressed file and persuading a user to open it with "gunzip -N", an attacker may replace or create arbitrary files with the privileges of the victim. This update addresses the issue by properly stripping paths from files when decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Image RAW
    By carefully crafting a corrupt Canon RAW image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Canon RAW images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    ImageIO
    By carefully crafting a corrupt Radiance image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Radiance images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    By carefully crafting a corrupt GIF image, an attacker can trigger an undetected memory allocation failure which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    By carefully crafting a corrupt GIF image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    LaunchServices
    Download Validation may erroneously identify certain files containing HTML as "safe". If such a file is downloaded in Safari and Safari's "Open `safe' files after downloading" option is enabled, the HTML document will automatically be opened from a local URI. This would allow any JavaScript code embedded in the document to bypass access restrictions normally imposed on remote content. This update provides additional checks to identify potentially malicious file types so that they are not automatically opened. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    OpenSSH
    Attempting to log in to an OpenSSH server ("Remote Login") using a nonexistent account causes the authentication process to hang. An attacker can exploit this behavior to detect the existence of a particular account. A large number of such attempts may lead to a denial of service. This update addresses the issue by properly handling attempted logins by nonexistent users. This issue does not affect systems prior to Mac OS X v10.4. Credit to Rob Middleton of the Centenary Institute (Sydney, Australia) for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    telnet
    When connected to a TELNET server, the client may send the contents of arbitrary environment variables to the server if the server requests them. Some environment variables may contain sensitive information that should not be sent over the network. This update addresses the issue by ensuring that only non-sensitive variables and variables that the user has explicitly requested are are shared with the server. Credit to Gael Delalleau and iDEFENSE for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    WebKit
    A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. This update addresses the issue by properly handling such documents. Credit to Jesse Ruderman of Mozilla Corporation for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    AppKit, ImageIO
    Buffer overflows were discovered in TIFF tag handling (CVE-2006-3459, CVE-2006-3465), the TIFF PixarLog decoder (CVE-2006-3461), and the TIFF NeXT RLE decoder (CVE-2006-3462). By carefully crafting a corrupt TIFF image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of TIFF images. Systems prior to Mac OS X v10.4 are affected only by the TIFF NeXT RLE decoder issue (CVE-2006-3462). Credit to Tavis Ormandy, Google Security Team for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7./

    Right after installing Security Update 2006-004 (Intel) on my macbook pro I am having troubles with my wireless connectivity. Here is the dump from the console:
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    I can reboot and it will work, but if I put my macbook to sleep it, when I wake it, it will do the same thing again.
    I am also getting timeouts waiting for results of 1st wireless scan to complete in console.
    Anyone else having this issue?
    MBP15-2GHZ   Mac OS X (10.4.7)  

  • System preferences shot after Security Update 2006-008 - no sound any more

    All sorts of strange problems after running the 2006-008 security update, yet only affecting one my two MacMini:
    System Preferences completely "shot", with the Date&Time item/icon looking very odd.
    The little flag for language/keyboard setting and date/time did not show any more in the top menu bar -- basically everything left side of the blue Spotlight magnifying glass icon was gone.
    Also Safari much more prone to quit.
    Managed to delete some prefs and cached stuff and to replace the System Preferences application with the one from the other (working ok) Mac.
    (I wish such components were available on the web!)
    However: Currently I get no sound whatsoever. When I check the option to have the little speaker symbol displayed in the menu bar it shows. But as soon as I click it once, it vanishes from the menu bar.
    In the Sound window, I have Volume set to full, yet everything is greyed out, "Sound off" is checked without my doing, while "Display sound volume in the menu bar" unchecks itself everytime(!)
    And, very odd: While resetting PRAM and the fsck-routine working ok (no problems found) and disk utility claiming to have repaired all permissions, I can not run a reset of Open Firmware/nvram with the O-F-Apple-Alt key combination (I'm using an original Apple USB Keyboard for this, since I'm aware that my 3rd party keyboards from Logitech and Microsoft often refuse to perform such kind of "low level" tasks).
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

    finally found the solution to my problems at
    http://www.macfixit.com/article.php?story=20061229012312895
    Late-Breakers
    Friday, December 29 2006 @ 01:23 AM PST
    Security Update 2006-008 Special Report: General fixes for common issues
    "Re-apply the Mac OS X 10.4.8 combo updater Once again, re-application of the current combination updater (Mac OS X 10.4.8 for PowerPC or Intel) has proven useful in the case of Security Update 2006-008. Doing so overwrites potentially problem-causing files".
    while it is widely known that the folks from redmond do release software before all the bugs are removed, i was not aware before that apple is following the same approach: using their customers as guinea pigs when it comes to updates. there is plenty of reports on MacFixIt about all sorts of troubles with previous apple os updates.
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

  • Multiple Errors - G5 Quad/Mac OSX 10.5.8 - After Security Update 2009-006

    I'm using a PPC G5 Quad, and after I installed Security Update 2009-006, I began having problems even being able to open project files Final Cut Pro 6. So I had to force quit FCP6, but even that wouldn't close the application.
    I figured the issue was probably just with the application, so I manually powered down the computer and only wound up getting two blank blue screens on my monitors when I powered back up.
    Powered down again, disconnected power cord for 2 minutes, then powered back up.
    Attempted to open FCP6, didn't work, wouldn't quit using "Force Quit."
    Opened Motion 3 to create a new project outside of FCP6 - when I selected "Save Project As" the application became unresponsive. Would not quit even when I selected "Force Quit."
    To test if there was an issue with other applications besides Final Cut Studio 2, I opened Pages and tried selecting "File->Open." This made the application unresponsive, and would not quit with "Force Quit."
    I repeated this test with:
    QuickTime Player
    Adobe Photoshop CS
    Preview
    Microsoft Word
    Safari
    ALL of these applications became unresponsive when I tried using the command "File->Open"
    I then decided to try installing Security Update 2009-005 to see if that would help.
    Because Safari was locked, I downloaded Security Update 2009-005 using Firefox, then re-downloaded Security Update 2009-006.
    After downloading both security updates, I manually powered down the computer, disconnected the power cord for 2 minutes, then re-powered on the computer.
    I immediately installed Security Update 2009-005 and restarted the computer.
    Once it restarted, I opened up Pages and was successfully able to use the command "File->Open" to open both templates and previously created files.
    I then opened FCP6 with no issues, and successfully opened and re-saved an existing project file.
    I then re-installed Security Update 2009-006, and re-started the computer according to its prompts.
    At first, it appeared that the issues were resolved. I opened Pages and was able to use the command "File->Open" to open an existing template.
    I then quit Pages and attempted to open a new Finder window. Immediately I got a spinning rainbow ball and got the message on my screen "System Failure" etc etc, and the last line read something about "Panic" or "System Panic - we're holding here..." or something to that effect. Quite strange.
    I'm now in the process of attempting to repair disk permissions using Disk Utility. The permissions that seem to be out of order are with:
    private/var/log/secure.log (what and where is this???)
    System/Library/CoreServices/Airport Base Station Agent.app/Contents/CodeResources"
    various Airport Utilities
    Various FrontRow
    Various backrow
    Several places I don't recognize such as usr/bin and usr/sbin
    And internet plugins related to FlashPlayer

    How full is the hard drive?

  • Startup fails after Security Update 2006-007

    My eMac hangs at the initial gray startup screen. All I did was to allow Software Update to install Security Update 2006-007. I have waited as long as 60+ minutes, hoping some process would time out - but this is not the case.
    My particulars: G4 eMac, 512Mb RAM, 40Gb drive with 15Gb free, 10.3.9 OS X Server (only supports a wireless classroom of 20 ibooks).
    Troubleshooting I have done:
    * Booted off of Mac OS X install disc. From Disk Utility, repaired permissions (minor fixes) and repaired hard drive (no errors at all).
    * Booted into command-V mode. Hangs after only 7 lines. The last line: "BSD root: disk0s3, major 14, minor 2"
    Is there any way to undo a Security Update from the Terminal window? I really don't want to do an 'install & archive', with all my user accounts, etc. I have a firewire backup, but as of last week when I got a CCC error it is no longer bootable. I am a high school teacher who knows a bit, but never enough

    I seems I'm not the only one experiencing start up problems after the 2006-2007 security update. G-4 Power PC, 466MHZ running OSX 10.3.9
    My problems are exasperated by the fact that there was a power outage exactly the same time I did the security update. Now my start up screen goes no further than the whitescreem with the blue bar. IT comes to within 1/4" or 1/16" of the end and stops.
    What I've tried:
    booted from OSx 10.3.9 Install disk,used disk utilities, Disk First Aid, no major problems found.
    Still sticks on start.
    Started from Disk Warrior and ran repair no problems. Still sticks on start.
    Tried to Safe Boot, with no success.
    Zapped the PRAM 4 times. No success.
    Tried to start from OSX install disk then bring up my backup disk drive from start up manager. Able to bring up back up, but same problem on start up as built in disk drive. Now I don't know how to unmount the backup disk drive without damage. THIS IS MY MAIN CONCERN AT THIS POINT. IF I LOSE THE BACKUP I'M FRIED!
    Please help, I don't know when we will have another power outage and my UPS backup power seems to be compromised also.
    Thanks
    G-4 466   Mac OS X (10.3.9)  

  • Please read this before you load SECURITY UPDATE 2010-006

    I've just spent 72 hours with frozen cursors and frozen screens - so far all directly related to security update 2010-006. After successfully using SuperDuper! to erase my Internal HD and load a 2+ week old system without security update 2010-006 I seem to be fine again.
    OK I have so much share-free ware on my MBP-13" (May 2010) running 10.6.4 that maybe I'm the only one on the planet to see this - but there is a 214 PAGE post for MBP-15 and MPB-17's freezing -- prior to Security Update 2010-006 ------ related or not, don't know.
    I believe I will actually get a duplicate MacBook Pro (or at least a MINI with the same chip/speed) so that I can keep one clean and experiment (i.e. download stuff) on the other. Then if a problem, my life doesn't stop. I realize that from banking to photos to news to work to reports to my balance sheet to SKYPE to eMail to....... wow, and in 1983 I just had my HP calculators!! These Macs just have to work!
    Best of success and comments welcome here.
    Steve
    11 Oct 2010

    Thanks for the feedback! I think my system is now "OK" (hours of checks, with Apple as well etc. etc.) but likely there was a conflict - and since I don't know what - and since I can't remove everything right now - if this keeps working I just won't install the security update 2010-006.
    BUT will this sneak up on me in security update 2010-007 or ??? I kinda have to get to the bottom of this - am actually thinking of buying a second, almost identical Mac (or at least a somewhat cheaper MINI 2.4 gHz) to have some backup beyond my external drives (which saved me!)
    Thanks again and any/all comments truly appreciated.
    Best regards,
    Steve Schulte
    Monday 11 October 2010

  • Apache denying http requests- could it be Security update 2006-007PPC?

    I've been webhosting off an iMac G4 for two years and yesterday no one could access any of the pages, coming from multiple DNSs. I opened up sharing and turned on the log, saw some denials. Some improvement by toggling Personal Web Sharing, but goes back to not letting requests go through. Just so happens, I upgraded the hard drive the day before using carbon copy cloner and also converted the main page to a CSS, although can't imagine that would do it since I used the template from a working page. Could it be one of these changed some Apache settings or Security Upgrade is responsible? I'm on the phone right now, telling someone I'm working on it....

    12190 deny tcp from any to any
    65535 allow ip from any to any</pre>Usually, though,
    if you turn on a service, the corresponding port
    should open in the firewall. If the firewall is off,
    I just get the last line starting with
    65535.
    That's about the same, I just didn't publish the info on the other ports because I didn't think it was pertinent.
    Checking
    the access log, I had been getting hammered for a
    while by something automated on PHP calendar I had
    posted- so I shut that down.
    I'm not sure I understand this. Does this mean you
    shut off the firewall and got the hits, or you saw
    the hits being denied? The other log entries you
    posted came from the system log or console, and
    not the Apache access log.
    I can see where that was confusing. Upon reviewing the httpd/access log (as well as any other I thought might provide a clue), there were a slew of hits, all different times of the day from one IP address, all on the PHPicalendar page I had posted. Sometimes the requests would be an individual hit, but most times they would come in groups of ten or twenty all about 4 seconds apart. These were logged all the way back to the oldest entries still in the log files. The computer had been dutifully fulfilling the requests and this most likely explains some system slowness I had been seeing on the machine. Since then I disabled that page and the requests get a 404 reply from Apache. I threw that comment out to justify why I was interested in changing my IP address. By the way, google calendar and iCal integrate really nicely, allowing iCal to subscribe to the google calendar and then I could export the iCal to the PHPicalendar. A little circuitous, but not annoyingly so. Anyway, now that I know that it's being targeted I'll probably just work with google calendar and the google notifier app for macs.
    Again, the closest event to
    the known start of the problem was the Security
    Update 2006-007PPC.
    For what it's worth, I've applied the Security Update
    on this iMac without this problem. Which is not to
    say it's not possible it caused the problem. But if
    so, it's still more likely to be something isolated
    to your system and not a general bug in the update.
    I think I might have figured out the problem. Going through the system log, I noticed the computer sleeping and waking. I went to system prefs and checked the settings, then changed to "never sleep." Seems to be working. I know I didn't change that setting, and I was under the impression that before, the http requests were waking the computer up- although I don't know, I just never had this problem before. To add to the confusion at one point the subnet address of the machine changed because I was trying to debug by doing a network restart and the router was pointing to the wrong computer. I'll have to check with the other users of this machine to see if they altered the setting- but they may not fess up since they know they're not supposed to mess with system prefs- as it is, I've got the parental controls turned on.
    As for the stability of the Comcast IP address, I
    unplugged the modem for about 6 hours last night,
    plugged it back and had the same IP
    address.
    That's been my experience, too. Comcast's IP
    addresses are tied to the MAC address of whatever
    customer supplied equipment faces it. I think you
    might have to be disconnected from the cable modem
    until the DHCP lease expires, and someone else gets
    your old IP address, in order to get a new IP
    address.
    I've been able to force a new IP address by changing
    the MAC address on my router. However, if you decide
    to try this, only use the MAC address from a
    device you have in your physical possession. For
    example, you could clone the MAC address from one of
    your computers to the router. Just make sure you go
    back to the router's real MAC address if you get rid
    of the computer.
    Remember, you have to reboot the cable modem any time
    you change the MAC address of the device connected to
    it. Just like you would if you connected a different
    computer directly to the cable modem.
    charlie
    Thanks, I'll try that. I'm going to give it another day or two to see if it's stable again.
    dan
    iMac G4, MacBook   Mac OS X (10.4.8)  

  • Did Security Update 2006-001 kill SpamAssassin 3.1.0?

    Greetings,
    It appears Apple's Mac OS X 10.3 (Panther) Security Update 2006-001 has killed my SA 3.1.0. After the update, upon starting spamd this is what happens:
    Mar 3 14:05:00 localhost spamd[15757]: spamd: server started on UNIX
    domain socket /tmp/spamd.sock (running version
    3.1.0-agsvsoft_2005102101)
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server pid: 15757
    Mar 3 14:05:01 localhost spamd[15759]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15759
    Mar 3 14:05:01 localhost spamd[15760]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15760
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:01 localhost spamd[15762]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15762
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15763]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15763
    Mar 3 14:05:01 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15759 due to SIGCHLD
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15764]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15764
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:01 localhost spamd[15765]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15765
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:02 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15762 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15760 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15763 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15764 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15766]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15766
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:02 localhost spamd[15767]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15767
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:02 localhost spamd[15768]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15768
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:02 localhost spamd[15769]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15769
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:03 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15765 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15767 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15766 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15768 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15770
    Mar 3 14:05:03 localhost spamd[15770]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:03 localhost spamd[15771]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15771
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:03 localhost spamd[15772]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15772
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:04 localhost spamd[15773]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15773
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:04 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15769 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15772 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15770 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15771 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15774]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15774
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:04 localhost spamd[15775]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15775
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:04 localhost spamd[15776]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15776
    Mar 3 14:05:05 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15773 due to SIGCHLD
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:05 localhost spamd[15777]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15777
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    [snip]
    Has anyone else seen this? I note from the release notes:
    perl
    CVE-ID: CVE-2005-4217
    Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9
    Impact: Perl programs may fail to drop privileges
    Description: When a perl program running as root attempts to switch to another user ID, the operation may fail without notification to the program. This may cause a program to continue to run with root privileges, assuming they have been dropped. This can cause security issues in third-party tools. This update addresses the issue by preventing such applications from continuing if the operation fails. This issue does not affect Mac OS X v10.4 or later systems. Credit to Jason Self for reporting this issue.
    Any advice would be most appreciated.
    Cheers,
    Damon
    PowerMac G4-867   Mac OS X (10.3.9)  

    The update prevents spamd to run as the default user "nobody". Running it as root seems to be the only workaround.

  • Downloading Security Update 2006-001 STOPS (!) my internetconnexion

    NO idea what this is: everytime I want to install new iTunes or Security Update 2006-001 , my internetconnexion falls out. Only then! After resetting router and modem all works fine again, but then when I want to install new iTunes or Security Update it happens again...?????
    I work on iMac G5 -10.4.5
    Anyone has an idea WHAT TO DO?? xxxTHANKS!xxx

    Welcome to Apple Discussions!
    Yes the same happened to me until my regular suggestion of repairing permissions solved it. Applications -> Utilities -> Disk Utility is where you select the hard disk and from First Aid repair permissions. For more upgrading tips, see this article which I wrote:
    http://www.macmaps.com/upgradefaq.html
    Disclaimer: Reference to links I make to my Macmaps.com website are a for your information only type reference. I do not get any profit from this page, and it is open to the public.

  • Security Update 2006-001 - The return?

    Hello!
    According to my software update which popped up after waking the computer I should install the latest security update (PowerPC), even though I installed it just a couple of days ago. Or, that's what I think...
    Should I just go ahead and install this 'second edition' too, or is there a way to check if the first update was installed properly (and to check that it actually happened)?
    Thank you!
    PowerBook G4 Aluminum   Mac OS X (10.4.5)  

    I installed security update 2006-001 last week and my SU shows nothing futher. And further, there is nothing further. Either your SU prefs are corrupted or it did not install properly.
    Look in /library/receipts to verify that you have that receipt.
    -mj
    [email protected]

  • Security Update 2006-001 Killed network preferences

    After upgrading with the 2006-001 Security Update, none of my network preferences will set up correctly anymore. DHCP doesn't seem to be doing anything, and when I tell it to use a manual address via the system preferences, it appears that it's not actually doing anything. Mac OS System Preferences will not even detect that I have an ethernet cable plugged in, though if I use ifconfig and route I can get a LITTLE bit of traffic to go out, so I know it's connected and working.
    Any one have any ideas on this? Absolutely frustrating because I can no longer work until this is fixed (sitting in an internet cafe trying to figure out what the problem is). I'm running 10.3.9 on a 1.2Ghz 12" Powerbook. I don't remember my Unix days well enough to try to manually set up routes and our DNS settings, nor do I know if the appropriate tools are in Mac OS, but the Apple network preferences are clearly busted.
    Is there anyway to uninstall an update?
    Patrick
    12" 1.2 Ghz PB   Mac OS X (10.3.9)  

    I had the same Network & Airport issue after installing Security Update 2006-001 on my wife's iBook G3 running 10.3.9 Trying to access our Airport base station wirelessly would inevitably hang as I selected the Airport network.
    I noticed that every time I shut down the computer there was a brief showing of the keychain window asking to allow keychain access...this right as the computer went down (no chance to hit the allow button).
    Spent the better part of an entire afternoon trying to fix this problem. Then read all the posts here (amazing how many people have problems with this update). Tried to reset permissions - didn't work. In the end, I rebooted the Airport...went into the Airport Admin Utility with my PowerBook to fiddle around...removed our Airport network from the keychain in my wife's iBook...explored other aspects via the keychain access utility.
    None of that seemed to work. I also figure I reset the permissions about half a dozen times (with subsequent reboot). None of that was working either...until after one permissions reset & reboot things came good. I got the keychain window, allowed access, and hey presto...online. So far it's been OK for over 12 hours (including after reboot).
    What exactly worked? I don't know. "It's a mystery".
    One thing's for sure...this update is not going on any of my other machines!
    Come on Apple...surely you can do better than send us automatic updates that break our computers and sap our time!
    iBook   Mac OS X (10.3.9)  

Maybe you are looking for