VideoHelp Forum




+ Reply to Thread
Page 2 of 2
FirstFirst 1 2
Results 31 to 38 of 38
  1. Member WiseWeasel's Avatar
    Join Date
    Jan 2003
    Location
    Silicon Valley, CA, USA
    Search Comp PM
    Or you can try the MisFox route for an equally good fix for this problem.
    I like systems, their application excepted. (George Sand, translated from French), "J'aime beaucoup les systèmes, le cas d'application excepté."
    Quote Quote  
  2. Well I'm really bored tonight, so I put together a quick web page with pictures for how to fix this security hole with Misfox.

    Maybe this will help someone:

    http://dotpuppy.dyndns.org/HelpViewerFix/
    Quote Quote  
  3. Member
    Join Date
    Apr 2004
    Location
    Melbourne, Australia
    Search Comp PM
    I have just received a security update from apple but I dont know if this fixes the problem.
    Quote Quote  
  4. Member g4cube's Avatar
    Join Date
    Feb 2004
    Location
    sydney australia
    Search Comp PM
    To test it wouldnt you just try the test script to see if apple have fixed it or not?
    G4 gigabit,PL1.35GHz,
    Radeon 9800 Pro 128,1.5GB ram,Pioneer dvr 107D,Running on tiger.
    Quote Quote  
  5. did it fix it???
    Quote Quote  
  6. Member
    Join Date
    Jun 2003
    Location
    -> here
    Search Comp PM
    Originally Posted by baturjan
    did it fix it???
    apple's last security update only fixed the Help Viewer issue.
    Until Apple fixes the other open issues I use Paranoid Android.
    Quote Quote  
  7. Member WiseWeasel's Avatar
    Join Date
    Jan 2003
    Location
    Silicon Valley, CA, USA
    Search Comp PM
    There are no other open issues. The disk:// protocol is normal behavior, and is not a security hole. Simply mounting a disk image will not cause you to be compromised. You would need to actually execute whatever is on the disk image manually, and at that point, it could easily have been any archive format. This update from Apple fixes the remote execution exploit, and as far as I'm concerned, there's no more problem. Disk images can auto-mount all they want, and it won't do a thing, unless I run untrusted content from that disk image, and then, I got what I deserved, especially if it was a <cough>beta</cough> of Microsoft Office from Gnutella or something. Glad there's finally a simple fix for the problem, for all the people who don't want to mess with MisFox and internet protocols.
    I like systems, their application excepted. (George Sand, translated from French), "J'aime beaucoup les systèmes, le cas d'application excepté."
    Quote Quote  
  8. Member WiseWeasel's Avatar
    Join Date
    Jan 2003
    Location
    Silicon Valley, CA, USA
    Search Comp PM
    I spoke too soon. Just saw the notice of the other exploits here:
    http://www.unsanity.com/haxies/pa/whitepaper/
    I fixed the problem with RCDefaultApp, and am pretty sure I'm no longer vulnerable. When it rains, it pours...
    I like systems, their application excepted. (George Sand, translated from French), "J'aime beaucoup les systèmes, le cas d'application excepté."
    Quote Quote  



Similar Threads

Visit our sponsor! Try DVDFab and backup Blu-rays!