![]() This vulnerability was patched quickly, but the truth is that proper quality control should have meant that it was never introduced in the first place. Understandably, many firms are cautious about making any changes to their users’ computers’ operating systems, in case incompatibilities or problems are introduced.Īn update can offer all the bells-and-whistles and funky features in the world, but your users are not going to appreciate the newly improved support for 4k displays (one of the enhancements in OS X 10.9.3) if the apps they use every day no longer work properly, or if unexpected behaviour by their computer sends them scurrying to the IT support desk for help. If you work in a company’s IT security department, you want to be given usable, actionable information about what security issues an update addresses so you can decide how important it is to push out across the computers under your control. The bad news is that means you’re going to have to download iTunes all over again – a not unsubstantial download. The good news is that Apple quickly issued a fix in the form of iTunes 11.2.1, which reportedly resolves the issue. Now, maybe that doesn’t matter to most users who probably don’t have multiple accounts on their Macs, but in an environment where a number of people might be sharing the same computer that’s not good news at all.Īnd even if you weren’t at risk from the security hole that iTunes 11.2 introduced, you should still be wondering just how a flaw like that crept into Apple’s code with their testing department noticing. This issue was addressed with improved permission handling. ![]() Impact: A local user can compromise other local user accountsĭescription: Upon each reboot, the permissions for the /Users and /Users/Shared directories would be set to world-writable, allowing modification of these directories. And, in turns out, that it was the new version of iTunes which was to blame.Īs a support note from Apple explains, iTunes 11.2 introduced a bug which could have allowed users who share your iMac or MacBook to compromise other user accounts on the computer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |