View Full Version : New Remote Exploit in Mac OS X

Nov 27, 2003, 08:02 PM
Category: News and Press Releases
Link: New Remote Exploit in Mac OS X (http://apple.slashdot.org/apple/03/11/26/1948243.shtml?tid=126&tid=172&tid=179&tid=185&tid=190)

Posted on MacBytes.com (http://www.macbytes.com)

Approved by arn

Nov 27, 2003, 08:56 PM
It's not written "SlashDot", it's simply "Slashdot".

Almost as annoying as the use of "MacIntosh". Or "MicroSoft". Argh!

Nov 28, 2003, 12:58 AM
Call me naive, but I'm not worried about these security holes. I suppose there might be malicious Mac users out there who would exploit something like this, but I think genereally Mac users are fairly benevolent, especially towards our own kind. Just look at the lack of viruses as a prime example of what I'm saying.

Nov 28, 2003, 09:24 AM
Originally posted by Xenex
It's not written "SlashDot", it's simply "Slashdot".

Almost as annoying as the use of "MacIntosh". Or "MicroSoft". Argh!

It was MicroSoft at one time, unlike the other two.

It's good that these security issues are found. It's interesting that there's already a way to use this one too. I'm surprised that someone who normally runs x86 Darwin hasn't tried to create a virus for us all. (Yes, I know you can't run x86 code on PPC, but I'm not giving anyone any more clues on how to do it, either.)

Nov 28, 2003, 12:02 PM
While this is definately something Apple should fix promptly, this isn't a big deal.

In order to exploit this hole, a hacker would have to be running a malicious DHCP server *within* the subnet containing the target machine. They would also have to get lucky and catch the target machine when it was requesting a DHCP lease.

So the likelyhood of this hole getting exploited is negligable.