Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple releases OS X NTP Security Update; Mac users advised to install ASAP
Apple Inc. ^ | December 22, 2014

Posted on 12/23/2014 12:29:16 AM PST by Swordmaker

Apple today released OS X NTP Security Update for Yosemite, Mavericks, and Mountain Lion.

Install this update as soon as possible.

This update addresses a critical security issue with the software that provides the Network Time Protocol service on OS X, and is recommended for all users.

Apple digitally signs its software updates to ensure the authenticity of update packages. Software Update automatically verifies a package’s signature prior to installing the update. If you manually download an update package, you can verify the signature yourself to confirm that the package is authentic and complete. See < HREF="http://support.apple.com/en-us/HT202369">this article for details on how to verify the authenticity of this download.

For more information on the security content of this update see Support.apple.com

OS X NTP Security Update is available via Software Update.

OS X NTP Security Update is also available via manual download. More info and download links:

OS X NTP Security Update: OS X Yosemite

OS X NTP Security Update: OS X Mavericks

OS X NTP Security Update: OS X Mountain Lion


TOPICS: Business/Economy; Computers/Internet
KEYWORDS:
Navigation: use the links below to view more comments.
first 1-2021-24 next last

1 posted on 12/23/2014 12:29:16 AM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
Important Network Time Protocol Security Update for OS X Lion, Mavericks, and Yosemite now available. Use Software update — PING!


Apple OS X Network Time Protocol Security Update Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 12/23/2014 12:32:22 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Thanks. Updated. Interested in knowing the extended issues involved with this. I’m sure the Fud Packers (FP) will tell us. BTTT.


3 posted on 12/23/2014 12:49:25 AM PST by PA Engineer (Liberate America from the Occupation Media.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

Thanks for posting this. I had it updated within a few minutes of seeing this.


4 posted on 12/23/2014 1:44:50 AM PST by Mark17 (So gracious and tender was He. I claimed Him that day as my savior, this stranger of Galilee)
[ Post Reply | Private Reply | To 1 | View Replies]

NTP was recently a pain in the ars for me... a BS mount issue NTP caused shutout PAM related logins...

chkconfig ntp off

There's the quick fix...

5 posted on 12/23/2014 1:52:21 AM PST by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Still using Tiger


6 posted on 12/23/2014 2:18:49 AM PST by Pontiac (The welfare state must fail because it is contrary to human nature and diminishes the human spirit.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

You might want to point out that the vulnerability is in NTP itself, not in only the Mac’s use of it. Looks like it’s in the NTP sources, which affect a lot of OSes, if I’m reading this correctly:

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9295


7 posted on 12/23/2014 2:43:06 AM PST by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Still using Snow Leopard ...


8 posted on 12/23/2014 2:46:08 AM PST by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Mountain Lion Security update link not right.

Correct one here:

http://support.apple.com/kb/DL1781?viewlocale=en_US&locale=en_US


9 posted on 12/23/2014 2:52:44 AM PST by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

I looked, and noticed NTP was amongst my Fedora updates pending. Don’t know if it’s a fix of the same thing, but I went ahead and installed it.


10 posted on 12/23/2014 6:55:31 AM PST by zeugma (The act of observing disturbs the observed.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker

My MBP auto-updated, so I’m good.


11 posted on 12/23/2014 7:06:34 AM PST by kevkrom (I'm not an unreasonable man... well, actually, I am. But hear me out anyway.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: kevkrom

It freaked me out to see an update applied that I did not have to approve. I didn’t like it. It seemed suspicious. So, I did some research and found that Apple pushed this security update using a system that does not require user interaction. Ugh. Sounds like another potential exploit vector.


12 posted on 12/23/2014 8:27:21 AM PST by DigitalVideoDude (It's amazing what you can accomplish when you don't care who gets the credit. -Ronald Reagan)
[ Post Reply | Private Reply | To 11 | View Replies]

To: DigitalVideoDude

I was surprised by the auto-update as well. Thanks for the information.


13 posted on 12/23/2014 9:03:01 AM PST by bubbacluck (America 180)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Swordmaker

Update done; thanks for the ping!


14 posted on 12/23/2014 9:55:33 AM PST by conservatism_IS_compassion ("Liberalism” is a conspiracy against the public by wire-service journalism.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

Update done; thanks for the ping!


15 posted on 12/23/2014 9:55:33 AM PST by conservatism_IS_compassion ("Liberalism” is a conspiracy against the public by wire-service journalism.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

Thanks for the head’s up. It was fast.


16 posted on 12/23/2014 10:41:43 AM PST by johniegrad
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

Yeah this applies to all systems and OSes with NTP, Linux, BSD, etc.


17 posted on 12/23/2014 4:49:42 PM PST by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: DigitalVideoDude; bubbacluck
It freaked me out to see an update applied that I did not have to approve. I didn’t like it. It seemed suspicious. So, I did some research and found that Apple pushed this security update using a system that does not require user interaction. Ugh. Sounds like another potential exploit vector.

Why are you surprised. At some point you set your App Store update preferences to automatically install updates, specifically system data files and security updates (those are the things that keep your Mac safe):


18 posted on 12/23/2014 9:17:23 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 12 | View Replies]

To: dayglored
Yeah this applies to all systems and OSes with NTP, Linux, BSD, etc.

Thanks for the info on the universality of this NTP flaw extending to all *nix type operating systems.

19 posted on 12/23/2014 9:20:44 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Swordmaker

These days, it seems everyone is sharing the same code base and the same vulnerabilities.


20 posted on 12/23/2014 9:25:42 PM PST by MediaMole
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson