New Remote Exploit in Mac OS X

Discussion in ' News Discussion' started by MacBytes, Nov 27, 2003.

  1. MacBytes macrumors bot

    Jul 5, 2003
  2. Xenex macrumors newbie


    Dec 6, 2001
    Sydney, New South Wales, Australia.

    It's not written "SlashDot", it's simply "Slashdot".

    Almost as annoying as the use of "MacIntosh". Or "MicroSoft". Argh!
  3. MoparShaha macrumors 68000


    May 15, 2003
    San Francisco
    Call me naive, but I'm not worried about these security holes. I suppose there might be malicious Mac users out there who would exploit something like this, but I think genereally Mac users are fairly benevolent, especially towards our own kind. Just look at the lack of viruses as a prime example of what I'm saying.
  4. bousozoku Moderator emeritus

    Jun 25, 2002
    Gone but not forgotten.
    Re: Nitpicking.

    It was MicroSoft at one time, unlike the other two.

    It's good that these security issues are found. It's interesting that there's already a way to use this one too. I'm surprised that someone who normally runs x86 Darwin hasn't tried to create a virus for us all. (Yes, I know you can't run x86 code on PPC, but I'm not giving anyone any more clues on how to do it, either.)
  5. bryanc macrumors 6502

    Feb 12, 2003
    Fredericton, NB Canada
    While this is definately something Apple should fix promptly, this isn't a big deal.

    In order to exploit this hole, a hacker would have to be running a malicious DHCP server *within* the subnet containing the target machine. They would also have to get lucky and catch the target machine when it was requesting a DHCP lease.

    So the likelyhood of this hole getting exploited is negligable.


Share This Page