Month Of Patches Takes On Month Of Apple Bugs - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Enterprise Applications

Month Of Patches Takes On Month Of Apple Bugs

A former Apple Computer developer posted patches for the first two vulnerabilities disclosed by the bug-a-day hacker crusade, and promised to meet each new flaw with a fix.

A day after the "Month of Apple Bugs" campaign debuted, a former Apple Computer developer posted patches for the first two vulnerabilities disclosed by the bug-a-day hacker crusade, and promised to meet each new flaw with a fix.

Landon Fuller, now involved in the DarwinPorts project -- an effort to install open-source software on the Mac OS X, Darwin, and OpenDarwin operating systems -- stepped in with the fixes as "part brain exercise, part public service," he wrote on his blog.

"You can download the source [code], or download a pre-built binary," Fuller said of the patch for the first Month of Apple Bugs (MoAB) vulnerability, which involves Apple's QuickTime media player. "You'll also need to install Application Enhancer to use this." Application Enhancer is a free-of-charge download from Unsanity, a St. George, Utah-based Mac developer.

The second MoAB flaw, which impacts the VLC media player, has also been patched by Fuller; the VLC developers have issued their own update to the media player. Fuller's second fix also requires Application Enhancer to install.

"If you'd like to help with tomorrow's MoAB vulnerability please feel free to send me patches or other information," Fuller added.

MoAB is a follow-up to November's "Month of Kernel Bugs" campaign, and is co-hosted by that project's poster, a hacker who goes by the initials "LMH," and his partner, Kevin Finisterre, a researcher who has also uncovered numerous Mac vulnerabilities.

Apple has been mum about MoAB. Tuesday, company spokesman Anuj Nayar simply said that "Apple takes security very seriously and has a great track record of addressing potential vulnerabilities before they can affect users."

The MoAB site can be found here; the day's vulnerability is typically posted during the afternoon, Pacific time.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
10 Ways to Prepare Your IT Organization for the Next Crisis
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/20/2020
News
IT Spending Forecast: Unfortunately, It's Going to Hurt
Jessica Davis, Senior Editor, Enterprise Apps,  5/15/2020
Commentary
Helping Developers and Enterprises Answer the Skills Dilemma
Joao-Pierre S. Ruth, Senior Writer,  5/19/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Slideshows
Flash Poll