The new version of iTunes includes minor security fixes only for Mac OS X v10.4.11, Mac OS X Server v10.4.11, Windows XP and Vista. Apple's Leopard operating system (10.5+) isn't affected.
The Mac-oriented fix addresses a misleading warning dialog box that "incorrectly informs the user that unblocking iTunes Music Sharing doesn't affect the firewall's security." The Windows-oriented fix addresses a privilege elevation flaw.
The QuickTime patch is more extensive. It addresses nine vulnerabilities, five of which affect Mac OS X v10.4.9 - v10.4.11, Mac OS X v10.5+, Windows Vista, XP SP2 and SP3. The remaining four affect only Windows Vista, XP SP2, and SP3.
The flaws all have to do with maliciously crafted movie and image files that can be used to crash applications and/or execute remote code.
The iPod Touch patch fixes a more diverse array of problems. These include vulnerabilities that have found in the iPod Touch's Application Sandbox, CoreGraphics, mDNSResponder, Networking, and WebKit components.
The mDNSResponder flaw is the one identified with much fanfare in August at the Black Hat conference by IOActive security researcher Dan Kaminsky. The Networking component flaw, which could allow TCP spoofing due to predictable TCP number generation, also appears to be related.
Apple's Bonjour is a service discovery protocol that can be used to make it easier to add devices such as printers to a network. The Bonjour for Windows 1.05 fix affects Windows Vista, XP SP2 and SP3, 2003, 2000. It addresses an application crash that can be generated by a maliciously crafted ".local" domain name. It also fixes the mDNSResponder component that is patched in the iPod Touch 2.1 update.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.