Security Update 2006-008 (Universal)

after installing this update, i've noticed that several apps, like Logic Expres and Yahoo quit unespectedly and give an error.
have problems caused this update you folks?

Well, I don’t know what may have caused that to happen, but it looks like you didn’t install the update properly. Were any of those applications running while installing it? Take a look at the following articles for guidelines on how to properly install system updates:
Troubleshooting installation and software updates
Installing software updates
Basically, you should verify/repair the startup disk before installing the update, no applications should be running while installing it, and you may experience unexpected results if you have third-party system software modifications (not normal applications) installed.
I don’t know what to do about Thunderbird, but we may investigate what happened in Mail if you wish. Please describe what exactly do you observe in Mail. How many accounts do you see in Mail > Preferences > Accounts? How many should be there? Have you tried searching for the missing messages in Spotlight?

Similar Messages

  • System preferences shot after Security Update 2006-008 - no sound any more

    All sorts of strange problems after running the 2006-008 security update, yet only affecting one my two MacMini:
    System Preferences completely "shot", with the Date&Time item/icon looking very odd.
    The little flag for language/keyboard setting and date/time did not show any more in the top menu bar -- basically everything left side of the blue Spotlight magnifying glass icon was gone.
    Also Safari much more prone to quit.
    Managed to delete some prefs and cached stuff and to replace the System Preferences application with the one from the other (working ok) Mac.
    (I wish such components were available on the web!)
    However: Currently I get no sound whatsoever. When I check the option to have the little speaker symbol displayed in the menu bar it shows. But as soon as I click it once, it vanishes from the menu bar.
    In the Sound window, I have Volume set to full, yet everything is greyed out, "Sound off" is checked without my doing, while "Display sound volume in the menu bar" unchecks itself everytime(!)
    And, very odd: While resetting PRAM and the fsck-routine working ok (no problems found) and disk utility claiming to have repaired all permissions, I can not run a reset of Open Firmware/nvram with the O-F-Apple-Alt key combination (I'm using an original Apple USB Keyboard for this, since I'm aware that my 3rd party keyboards from Logitech and Microsoft often refuse to perform such kind of "low level" tasks).
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

    finally found the solution to my problems at
    http://www.macfixit.com/article.php?story=20061229012312895
    Late-Breakers
    Friday, December 29 2006 @ 01:23 AM PST
    Security Update 2006-008 Special Report: General fixes for common issues
    "Re-apply the Mac OS X 10.4.8 combo updater Once again, re-application of the current combination updater (Mac OS X 10.4.8 for PowerPC or Intel) has proven useful in the case of Security Update 2006-008. Doing so overwrites potentially problem-causing files".
    while it is widely known that the folks from redmond do release software before all the bugs are removed, i was not aware before that apple is following the same approach: using their customers as guinea pigs when it comes to updates. there is plenty of reports on MacFixIt about all sorts of troubles with previous apple os updates.
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

  • Missing SENT & REPLY email msgs after installing Security Update 2006-008

    I'm using Mail Version 2.1 (752/752.2) to handle my Mac.com and Comcast email traffic.
    Today I realized that I cannot access/find any of my outgoing email messages sent prior to January 2, 2007. Any emails that I sent prior to that date are missing from my "SENT" mailbox(es). Also, whenever I click on the "Reply" icon next to an incoming email that I answered (prior to 1/2/07) a window pops up with the following message:
    "Mail was unable to find your response to the message “(fill in the blank)”. You may have deleted the message."
    I am 100% certain that I did NOT delete any of these sent messges.
    Coincidentally (?) I installed Security Update 2006-008 (PowerPC) on January 2, 2007 as well. Did this update cause my sent messages to be deleted? Is anyone else having this problem? Anyone have any suggestions to recover/find my missing emails?
    Thanks!

    I’ll be out for several ours. If Spotlight cannot find those messages, it probably means that they’ve indeed been deleted for some reason. In that case, if you don’t have a backup, your only option would be to try to salvage as many deleted *.emlx files as possible with a data recovery tool such as Data Rescue II, TechTool Pro, or FileSalvage. Of these, the only one I know for sure that can currently recover deleted *.emlx files is FileSalvage. Stop using your computer right now if you want to try that, as anything you do with the computer may cause the deleted files to be overwritten.

  • Apple Releases Security Update 2006-004 (PowerPC and Intel)

    From Macfixit................
    Apple has released Security Update 2006-004 for Mac OS X in both PowerPC and Intel versions. This update requires Mac OS X 10.4.7 for either PowerPC or Intel, Mac OS X 10.3.9 or Mac OS X 10.3.9 Server.
    This is the fourth major standalone security update for Mac OS X released this year.
    Update procedure recommendation First, avoid performing any other operations (in Mac OS X or third-party applications) while the update process is occurring. In addition, before installing this security update, make sure all Apple-installed applications and utilities are in their original locations. Moving one of these applications to a different location on your hard drive can lead to an incomplete update. Also, disconnect any FireWire/USB devices before applying the update (except for your startup drive, if it is FireWire or USB, and your keyboard/mouse), then re-connect the devices one by one (checking for issues created by any particular device) after the update process is complete and the system has restarted.
    Enhancements in this release
    Of most interest to general end-users:
    a fix that prevents maliciously crafted Zip archives from causing condition where arbitrary code can be execute. In other words, prior to Security Update 2006-004 you could download a specially crafted file ending in .zip from a Web site or other location, and it could trigger the execution of malicious code.
    a fix that disallows maliciously crafted Canon RAW images from creating a buffer overflow, potentially leading to arbitrary code execution. Prior to Security Update 2006-004, you could download or otherwise receive a Canon RAW file that could allow execution of malicious code on your system.
    similar to the above, a fix that prevents maliciously crafted GIF images from causing an integer overflow, potentially leading to arbitrary code execution.
    new download validation that will catch certain HTML files defined by Safari as "safe" that may actually contain malicious JavaScript code. After applying Security Update 2006-004, these files will not be automatically opened.
    Protection against maliciously crafted HTML documents that can also open the door for arbitrary code execution by accessing deallocated objects.
    A full list of enhancements is as follows:
    AFP Server
    An issue in the AFP server allows search results to include files and folders for which the user performing the search has no access. This may lead to information disclosure if the names themselves are sensitive information. If the permissions of the items allow it, the contents may also be accessible. This update addresses the issue in Mac OS X v10.3.9 by ensuring that search results only include items for which the user is authorized. For Mac OS X v10.4 systems, the issue was addressed in Mac OS X v10.4.7. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9:
    The AFP server contains an integer overflow that can be triggered by an authenticated user. A malicious user with access to the AFP server may be able to cause a denial of service attack or arbitrary code execution with system privileges. The AFP server is not enabled by default on Mac OS X. This update addresses the issue by performing additional validation. Credit to Dino Dai Zovi of Matasano Security for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    On Mac OS X Server, the AFP server supports reconnection of file sharing sessions after a network outage. The storage of reconnect keys is world-readable. It may be possible for an authenticated local user to read the reconnect keys, use them to impersonate another user over AFP, and access files or folders with the privileges of the impersonated user. This update addresses the issue by protecting the reconnect keys with appropriate file system permissions. This issue only affects Mac OS X Server. Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.7.
    An unchecked error condition exists in the AFP server that may lead to a crash. By carefully crafting an invalid AFP request, an attacker may be able to trigger this condition and cause a denial of service. This update addresses the issue by handling the formerly unchecked error condition. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bluetooth
    The security of the Bluetooth Setup Assistant has been improved in this update for Mac OS X v10.4.7. The length of the automatically generated passkey used for pairing has been increased from six characters to eight characters. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bom
    An issue in Bom's compression state handling may cause heap corruption. By carefully crafting a corrupt Zip archive and persuading a victim to open it, an attacker may be able to trigger this condition which could lead to an application crash or arbitrary code execution. Note that Safari will automatically open archives when "Open `safe' files after downloading" is enabled. This update addresses the issue by properly handling such malformed Zip archives. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    DHCP
    A stack buffer overflow exists in bootpd's request processing. By carefully crafting a malicious BOOTP request, a remote attacker may be able to trigger the overflow and cause arbitrary code execution with the privileges of the system. Note that bootpd is not enabled by default in Mac OS X, and must be manually configured in order to be enabled. This update addresses the issue by performing additional bounds checking. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    dyld
    Malicious local system users may specify dynamic linker options that cause output to standard error. This output contains informational content and potentially user-specified content. As a result, privileged applications that parse or reuse standard error may be influenced inappropriately. This update addresses the issue by ignoring the problematic dynamic linker options in privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    An improperly handled condition in the dynamic linker may lead to including dangerous paths when searching for libraries to load into privileged applications. As a result, malicious local users may cause the dynamic linker to load and execute arbitrary code with elevated privileges. This update addresses the issue by properly selecting search paths when executing privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    fetchmail
    Several issues in the fetchmail utility were discovered. The most serious issue could lead to arbitrary code execution when fetching mail from a malicious POP3 mail server. All issues are described at the fetchmail website (fetchmail.berlios.de). This update addresses the issues by updating fetchmail to version 6.3.4. In addition, fetchmail is no longer distributed as a privileged utility. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    gunzip
    A race condition may allow a malicious local user to modify the permissions of files owned by another user executing gunzip. This issue is only exploitable when executing gunzip on files in directories that are modifiable by other users. This update addresses the issue by properly handling files while decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    A directory traversal vulnerability is present in the command line utility gunzip when it is used with the non-default "-N" option. By carefully crafting a malicious compressed file and persuading a user to open it with "gunzip -N", an attacker may replace or create arbitrary files with the privileges of the victim. This update addresses the issue by properly stripping paths from files when decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Image RAW
    By carefully crafting a corrupt Canon RAW image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Canon RAW images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    ImageIO
    By carefully crafting a corrupt Radiance image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Radiance images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    By carefully crafting a corrupt GIF image, an attacker can trigger an undetected memory allocation failure which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    By carefully crafting a corrupt GIF image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    LaunchServices
    Download Validation may erroneously identify certain files containing HTML as "safe". If such a file is downloaded in Safari and Safari's "Open `safe' files after downloading" option is enabled, the HTML document will automatically be opened from a local URI. This would allow any JavaScript code embedded in the document to bypass access restrictions normally imposed on remote content. This update provides additional checks to identify potentially malicious file types so that they are not automatically opened. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    OpenSSH
    Attempting to log in to an OpenSSH server ("Remote Login") using a nonexistent account causes the authentication process to hang. An attacker can exploit this behavior to detect the existence of a particular account. A large number of such attempts may lead to a denial of service. This update addresses the issue by properly handling attempted logins by nonexistent users. This issue does not affect systems prior to Mac OS X v10.4. Credit to Rob Middleton of the Centenary Institute (Sydney, Australia) for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    telnet
    When connected to a TELNET server, the client may send the contents of arbitrary environment variables to the server if the server requests them. Some environment variables may contain sensitive information that should not be sent over the network. This update addresses the issue by ensuring that only non-sensitive variables and variables that the user has explicitly requested are are shared with the server. Credit to Gael Delalleau and iDEFENSE for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    WebKit
    A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. This update addresses the issue by properly handling such documents. Credit to Jesse Ruderman of Mozilla Corporation for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    AppKit, ImageIO
    Buffer overflows were discovered in TIFF tag handling (CVE-2006-3459, CVE-2006-3465), the TIFF PixarLog decoder (CVE-2006-3461), and the TIFF NeXT RLE decoder (CVE-2006-3462). By carefully crafting a corrupt TIFF image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of TIFF images. Systems prior to Mac OS X v10.4 are affected only by the TIFF NeXT RLE decoder issue (CVE-2006-3462). Credit to Tavis Ormandy, Google Security Team for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7./

    Right after installing Security Update 2006-004 (Intel) on my macbook pro I am having troubles with my wireless connectivity. Here is the dump from the console:
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    I can reboot and it will work, but if I put my macbook to sleep it, when I wake it, it will do the same thing again.
    I am also getting timeouts waiting for results of 1st wireless scan to complete in console.
    Anyone else having this issue?
    MBP15-2GHZ   Mac OS X (10.4.7)  

  • Please help: PPC Tiger 10.4.11, dock crashes after security update 2008-008

    I had no problems so far, everything worked great on my iBook G3 PPC 700Mhz 10.4.11 till I installed the latest Apple Security Update 2008-008 through Software Update in System Preferences. After restarting my system is gone crazy. The dock crashes like every three seconds, usually when I click on something, besides that I cant click normally, I have to like click 2 or 3 times to get something opened and also the mouse jumps from one place on the screen to another place on the screen. A security update is ought to fix a problem, not to create a problem. I cant and wont do a new systeminstall, it will take me days to get my iBook back in the state it was a couple of days ago with all the applications and other third party components. Please help me fix this problem to get my iBook back to normal as it was a couple of days ago.
    Thanks in advance.

    Safe Boot , (holding Shift key down at bootup), & use Disk Utility from there to Repair Permissions, try dragging these 2 files to the desktop then reboot...
    /Users/YourUserName/Library/Preferences/com.apple.finder.plist
    /Users/YourUserName/Library/Preferences/com.apple.dock.plist

  • Security Update 2008-008 knocks out router

    Since installing security update 2008-008 on two computers (MacBook Pro and Power Mac G5, both running OS 10.4.11) earlier this week, my router (Belkin Wireless G model F5D7230-4) no longer connects me to the internet. I also found that my Network preferences had been unlocked and "changed by another application" (or some similar message). It was extremely difficult to get past this message in order to make any changes to these preferences. I was finally able to be quick enough to click on OK on the message and then on Assist Me before the next identical message window returned. From there I could lock Network Preferences. But nothing looks off in the configurations.
    Any ideas on getting my router connected again?

    Hi CecG, and a warm welcome to the forums!
    To stop the pop-up, Go to System Preferences: Security. Check the box next to "Require password to unlock each secure system preference." Then lock Security.
    Try this cure for Security update...
    http://discussions.apple.com/thread.jspa?threadID=1730909&tstart=0
    Then... Try putting these numbers in Network>TCP/IP>DNS Servers, for the Airport Interface...
    208.67.222.222
    208.67.220.220
    Then Apply

  • Startup fails after Security Update 2006-007

    My eMac hangs at the initial gray startup screen. All I did was to allow Software Update to install Security Update 2006-007. I have waited as long as 60+ minutes, hoping some process would time out - but this is not the case.
    My particulars: G4 eMac, 512Mb RAM, 40Gb drive with 15Gb free, 10.3.9 OS X Server (only supports a wireless classroom of 20 ibooks).
    Troubleshooting I have done:
    * Booted off of Mac OS X install disc. From Disk Utility, repaired permissions (minor fixes) and repaired hard drive (no errors at all).
    * Booted into command-V mode. Hangs after only 7 lines. The last line: "BSD root: disk0s3, major 14, minor 2"
    Is there any way to undo a Security Update from the Terminal window? I really don't want to do an 'install & archive', with all my user accounts, etc. I have a firewire backup, but as of last week when I got a CCC error it is no longer bootable. I am a high school teacher who knows a bit, but never enough

    I seems I'm not the only one experiencing start up problems after the 2006-2007 security update. G-4 Power PC, 466MHZ running OSX 10.3.9
    My problems are exasperated by the fact that there was a power outage exactly the same time I did the security update. Now my start up screen goes no further than the whitescreem with the blue bar. IT comes to within 1/4" or 1/16" of the end and stops.
    What I've tried:
    booted from OSx 10.3.9 Install disk,used disk utilities, Disk First Aid, no major problems found.
    Still sticks on start.
    Started from Disk Warrior and ran repair no problems. Still sticks on start.
    Tried to Safe Boot, with no success.
    Zapped the PRAM 4 times. No success.
    Tried to start from OSX install disk then bring up my backup disk drive from start up manager. Able to bring up back up, but same problem on start up as built in disk drive. Now I don't know how to unmount the backup disk drive without damage. THIS IS MY MAIN CONCERN AT THIS POINT. IF I LOSE THE BACKUP I'M FRIED!
    Please help, I don't know when we will have another power outage and my UPS backup power seems to be compromised also.
    Thanks
    G-4 466   Mac OS X (10.3.9)  

  • Apache denying http requests- could it be Security update 2006-007PPC?

    I've been webhosting off an iMac G4 for two years and yesterday no one could access any of the pages, coming from multiple DNSs. I opened up sharing and turned on the log, saw some denials. Some improvement by toggling Personal Web Sharing, but goes back to not letting requests go through. Just so happens, I upgraded the hard drive the day before using carbon copy cloner and also converted the main page to a CSS, although can't imagine that would do it since I used the template from a working page. Could it be one of these changed some Apache settings or Security Upgrade is responsible? I'm on the phone right now, telling someone I'm working on it....

    12190 deny tcp from any to any
    65535 allow ip from any to any</pre>Usually, though,
    if you turn on a service, the corresponding port
    should open in the firewall. If the firewall is off,
    I just get the last line starting with
    65535.
    That's about the same, I just didn't publish the info on the other ports because I didn't think it was pertinent.
    Checking
    the access log, I had been getting hammered for a
    while by something automated on PHP calendar I had
    posted- so I shut that down.
    I'm not sure I understand this. Does this mean you
    shut off the firewall and got the hits, or you saw
    the hits being denied? The other log entries you
    posted came from the system log or console, and
    not the Apache access log.
    I can see where that was confusing. Upon reviewing the httpd/access log (as well as any other I thought might provide a clue), there were a slew of hits, all different times of the day from one IP address, all on the PHPicalendar page I had posted. Sometimes the requests would be an individual hit, but most times they would come in groups of ten or twenty all about 4 seconds apart. These were logged all the way back to the oldest entries still in the log files. The computer had been dutifully fulfilling the requests and this most likely explains some system slowness I had been seeing on the machine. Since then I disabled that page and the requests get a 404 reply from Apache. I threw that comment out to justify why I was interested in changing my IP address. By the way, google calendar and iCal integrate really nicely, allowing iCal to subscribe to the google calendar and then I could export the iCal to the PHPicalendar. A little circuitous, but not annoyingly so. Anyway, now that I know that it's being targeted I'll probably just work with google calendar and the google notifier app for macs.
    Again, the closest event to
    the known start of the problem was the Security
    Update 2006-007PPC.
    For what it's worth, I've applied the Security Update
    on this iMac without this problem. Which is not to
    say it's not possible it caused the problem. But if
    so, it's still more likely to be something isolated
    to your system and not a general bug in the update.
    I think I might have figured out the problem. Going through the system log, I noticed the computer sleeping and waking. I went to system prefs and checked the settings, then changed to "never sleep." Seems to be working. I know I didn't change that setting, and I was under the impression that before, the http requests were waking the computer up- although I don't know, I just never had this problem before. To add to the confusion at one point the subnet address of the machine changed because I was trying to debug by doing a network restart and the router was pointing to the wrong computer. I'll have to check with the other users of this machine to see if they altered the setting- but they may not fess up since they know they're not supposed to mess with system prefs- as it is, I've got the parental controls turned on.
    As for the stability of the Comcast IP address, I
    unplugged the modem for about 6 hours last night,
    plugged it back and had the same IP
    address.
    That's been my experience, too. Comcast's IP
    addresses are tied to the MAC address of whatever
    customer supplied equipment faces it. I think you
    might have to be disconnected from the cable modem
    until the DHCP lease expires, and someone else gets
    your old IP address, in order to get a new IP
    address.
    I've been able to force a new IP address by changing
    the MAC address on my router. However, if you decide
    to try this, only use the MAC address from a
    device you have in your physical possession. For
    example, you could clone the MAC address from one of
    your computers to the router. Just make sure you go
    back to the router's real MAC address if you get rid
    of the computer.
    Remember, you have to reboot the cable modem any time
    you change the MAC address of the device connected to
    it. Just like you would if you connected a different
    computer directly to the cable modem.
    charlie
    Thanks, I'll try that. I'm going to give it another day or two to see if it's stable again.
    dan
    iMac G4, MacBook   Mac OS X (10.4.8)  

  • Did Security Update 2006-001 kill SpamAssassin 3.1.0?

    Greetings,
    It appears Apple's Mac OS X 10.3 (Panther) Security Update 2006-001 has killed my SA 3.1.0. After the update, upon starting spamd this is what happens:
    Mar 3 14:05:00 localhost spamd[15757]: spamd: server started on UNIX
    domain socket /tmp/spamd.sock (running version
    3.1.0-agsvsoft_2005102101)
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server pid: 15757
    Mar 3 14:05:01 localhost spamd[15759]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15759
    Mar 3 14:05:01 localhost spamd[15760]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15760
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:01 localhost spamd[15762]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15762
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15763]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15763
    Mar 3 14:05:01 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15759 due to SIGCHLD
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15764]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15764
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:01 localhost spamd[15765]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15765
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:02 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15762 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15760 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15763 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15764 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15766]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15766
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:02 localhost spamd[15767]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15767
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:02 localhost spamd[15768]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15768
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:02 localhost spamd[15769]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15769
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:03 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15765 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15767 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15766 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15768 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15770
    Mar 3 14:05:03 localhost spamd[15770]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:03 localhost spamd[15771]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15771
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:03 localhost spamd[15772]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15772
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:04 localhost spamd[15773]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15773
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:04 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15769 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15772 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15770 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15771 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15774]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15774
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:04 localhost spamd[15775]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15775
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:04 localhost spamd[15776]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15776
    Mar 3 14:05:05 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15773 due to SIGCHLD
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:05 localhost spamd[15777]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15777
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    [snip]
    Has anyone else seen this? I note from the release notes:
    perl
    CVE-ID: CVE-2005-4217
    Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9
    Impact: Perl programs may fail to drop privileges
    Description: When a perl program running as root attempts to switch to another user ID, the operation may fail without notification to the program. This may cause a program to continue to run with root privileges, assuming they have been dropped. This can cause security issues in third-party tools. This update addresses the issue by preventing such applications from continuing if the operation fails. This issue does not affect Mac OS X v10.4 or later systems. Credit to Jason Self for reporting this issue.
    Any advice would be most appreciated.
    Cheers,
    Damon
    PowerMac G4-867   Mac OS X (10.3.9)  

    The update prevents spamd to run as the default user "nobody". Running it as root seems to be the only workaround.

  • Downloading Security Update 2006-001 STOPS (!) my internetconnexion

    NO idea what this is: everytime I want to install new iTunes or Security Update 2006-001 , my internetconnexion falls out. Only then! After resetting router and modem all works fine again, but then when I want to install new iTunes or Security Update it happens again...?????
    I work on iMac G5 -10.4.5
    Anyone has an idea WHAT TO DO?? xxxTHANKS!xxx

    Welcome to Apple Discussions!
    Yes the same happened to me until my regular suggestion of repairing permissions solved it. Applications -> Utilities -> Disk Utility is where you select the hard disk and from First Aid repair permissions. For more upgrading tips, see this article which I wrote:
    http://www.macmaps.com/upgradefaq.html
    Disclaimer: Reference to links I make to my Macmaps.com website are a for your information only type reference. I do not get any profit from this page, and it is open to the public.

  • Security Update 2006-001 - The return?

    Hello!
    According to my software update which popped up after waking the computer I should install the latest security update (PowerPC), even though I installed it just a couple of days ago. Or, that's what I think...
    Should I just go ahead and install this 'second edition' too, or is there a way to check if the first update was installed properly (and to check that it actually happened)?
    Thank you!
    PowerBook G4 Aluminum   Mac OS X (10.4.5)  

    I installed security update 2006-001 last week and my SU shows nothing futher. And further, there is nothing further. Either your SU prefs are corrupted or it did not install properly.
    Look in /library/receipts to verify that you have that receipt.
    -mj
    [email protected]

  • Security Update 2006-001 Killed network preferences

    After upgrading with the 2006-001 Security Update, none of my network preferences will set up correctly anymore. DHCP doesn't seem to be doing anything, and when I tell it to use a manual address via the system preferences, it appears that it's not actually doing anything. Mac OS System Preferences will not even detect that I have an ethernet cable plugged in, though if I use ifconfig and route I can get a LITTLE bit of traffic to go out, so I know it's connected and working.
    Any one have any ideas on this? Absolutely frustrating because I can no longer work until this is fixed (sitting in an internet cafe trying to figure out what the problem is). I'm running 10.3.9 on a 1.2Ghz 12" Powerbook. I don't remember my Unix days well enough to try to manually set up routes and our DNS settings, nor do I know if the appropriate tools are in Mac OS, but the Apple network preferences are clearly busted.
    Is there anyway to uninstall an update?
    Patrick
    12" 1.2 Ghz PB   Mac OS X (10.3.9)  

    I had the same Network & Airport issue after installing Security Update 2006-001 on my wife's iBook G3 running 10.3.9 Trying to access our Airport base station wirelessly would inevitably hang as I selected the Airport network.
    I noticed that every time I shut down the computer there was a brief showing of the keychain window asking to allow keychain access...this right as the computer went down (no chance to hit the allow button).
    Spent the better part of an entire afternoon trying to fix this problem. Then read all the posts here (amazing how many people have problems with this update). Tried to reset permissions - didn't work. In the end, I rebooted the Airport...went into the Airport Admin Utility with my PowerBook to fiddle around...removed our Airport network from the keychain in my wife's iBook...explored other aspects via the keychain access utility.
    None of that seemed to work. I also figure I reset the permissions about half a dozen times (with subsequent reboot). None of that was working either...until after one permissions reset & reboot things came good. I got the keychain window, allowed access, and hey presto...online. So far it's been OK for over 12 hours (including after reboot).
    What exactly worked? I don't know. "It's a mystery".
    One thing's for sure...this update is not going on any of my other machines!
    Come on Apple...surely you can do better than send us automatic updates that break our computers and sap our time!
    iBook   Mac OS X (10.3.9)  

  • Focus switch to finder after Security Update 2006-001

    Just updated with Security Update 2006-001 on PB G4 running 10.4.5.
    While running Safari or Mail or any App. and not using the app (like when reading a webpage or mail message) the focus of the OS switches to the Finder after about 10 seconds or so. So in the top menubar right from Apple icon the OS switches from Safari or Mail to Finder.
    Moving the mouse does not make any difference. i.e does not prevent or delay the switch.
    Clicking on the application window returns focus to that application (Safari or Mail).
    Anyone?

    thanks for the input. did not resolve the probelm though. finder started to crash every 2 minutes.
    but on the bright side: its a user thing. my guest account was not affected.
    so i trashed most of my prefs. that resolved the finder problem.
    currently working on restoring my prefs & email accounts, oh well

  • After applying Security Update 2006-001 can't launch Office X apps

    I noticed that, after applying Security Update 2006-001, I can't launch Microsoft Word nor Excel nor Power Point (Office X, 10.1.6 updated). If I double click the app icon, select and try to open from File menu or try to launch it from the Dock, I get the message "The app has unexpectedly quit". This does not affect Entourage so far. I can open existing files double clicking on their icons and, once the app is running, create new files from menu bar. Repaired permissions, checked for corrupted preferences files or templates but to no avail.
    Can anybody help?
    iBook G4   Mac OS X (10.3.9)   512 MB RAM

    DivX Doctor is a freeware I had downloaded a few days before applying Security Update 2006-01 (http://www.macupdate.com/info.php/id/4683). It certainly was responsible for my problems with Office X apps because, as I said, they completely disappeared as soon as I got rid of it.
    I hadn't the memory problems you mentioned (I've applied also Security update 2006-02 without problems).
    Don't know if this can help, but you might want to give a try to Disk inventory X (http://www.macupdate.com/info.php/id/14393) [quote]Disk Inventory X is a disk usage utility for Mac OS X. It shows the sizes of files and folders in a special graphical way called "treemaps".
    If you've ever wondered were all your disk space has gone, Disk Inventory X will help you to answer this question.[/quote]
    Once DiskWarrior fixed a problem with free hard disk space on my machine, even though a small one.
    iBook G4    

  • Question Regarding Security Updates 2006-005 and 2006-006?

    Okay I just noticed Apple Security Update 2006-005 and 2006-006 are available for download. Has anyone had any problems with these updates? I remember the Security Update 2006-001 was a nightmare for me -- Safari was broken after that update I had to do a complete OS reinstall then re-update to Mac OSZ 10.3.9 Panther and I only want to update if the likelihood of any problems occuring is very slim. Anyone running Mac OS X on PowerPC chips (i.e. using a PowerBook, an older iMac, Mac Mini, PowerMac etc) or on Intel chips (i.e. MacBook Pro, the new iMacs, new Mac Mini's etc) with Mac OS X Panther, Mac OS X Tiger etc having any problems with either update?

    (10.3.9 Client) seems to have broken my CS2 Version Cue after loading Security Update 2006-006 via Software Update - 27MB or something.
    Though afterwards all apps (Illustrator 12.0.1, Acrobat 7.0.8, PS 9.0.1 and InDesign 4.0.4) open and run fine, Version Cue disappeared from the Desktop Menu and System Preferences and says it's no longer installed, all this immediately after loading the Update and restarting.
    Two restarts and a Repair Permissions haven't resolved the issue. I've downloaded the stand alone Update and have run that but without any luck. I'd had no history of any trouble with any Security Update prior to this, and have run good maintenance schedules.
    I've not seen any other posts or related issues to mine, so maybe it's just my isolated event?

Maybe you are looking for