New Remote Exploit in Mac OS X

Discussion in 'MacBytes.com News Discussion' started by MacBytes, Nov 27, 2003.

  1. macrumors bot

    Joined:
    Jul 5, 2003
    #1
  2. macrumors newbie

    Xenex

    Joined:
    Dec 6, 2001
    Location:
    Sydney, New South Wales, Australia.
    #2
    Nitpicking.

    It's not written "SlashDot", it's simply "Slashdot".

    Almost as annoying as the use of "MacIntosh". Or "MicroSoft". Argh!
     
  3. macrumors 68000

    MoparShaha

    Joined:
    May 15, 2003
    Location:
    San Francisco
    #3
    Call me naive, but I'm not worried about these security holes. I suppose there might be malicious Mac users out there who would exploit something like this, but I think genereally Mac users are fairly benevolent, especially towards our own kind. Just look at the lack of viruses as a prime example of what I'm saying.
     
  4. Moderator emeritus

    Joined:
    Jun 25, 2002
    Location:
    Gone but not forgotten.
    #4
    Re: Nitpicking.

    It was MicroSoft at one time, unlike the other two.

    It's good that these security issues are found. It's interesting that there's already a way to use this one too. I'm surprised that someone who normally runs x86 Darwin hasn't tried to create a virus for us all. (Yes, I know you can't run x86 code on PPC, but I'm not giving anyone any more clues on how to do it, either.)
     
  5. macrumors 6502

    Joined:
    Feb 12, 2003
    Location:
    Fredericton, NB Canada
    #5
    While this is definately something Apple should fix promptly, this isn't a big deal.

    In order to exploit this hole, a hacker would have to be running a malicious DHCP server *within* the subnet containing the target machine. They would also have to get lucky and catch the target machine when it was requesting a DHCP lease.

    So the likelyhood of this hole getting exploited is negligable.

    Cheers
     

Share This Page