lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <3C1C830E-0A74-11D8-A7DC-000393790D08@comcast.net> Date: Wed, 29 Oct 2003 19:58:54 -0500 From: James Kelly <macubergeek@...cast.net> To: bugtraq@...urityfocus.com Subject: Re: Mac OS X vulnerabilities This vulnerability is much ado about nothing It was caused by developers of shareware using third party installers which changed the permissions on certain directories of MacOS X. Problem largely solved with the increased use of Apple's installer AND problem is easily fixed by adding this command to a root cron job. diskutil repairpermissions / Above command can be run every day for your paranoia protection ;-) jamesk