Posted on 10-16-2014 05:48 PM
Mavericks - https://support.apple.com/kb/DL1772
Mountain Lion - https://support.apple.com/kb/DL1771?
Posted on 10-16-2014 06:02 PM
Yeah, was just going to post about this as well. Appears to address the recently announced "POODLE" vulnerability. That was fast!
Posted on 10-17-2014 07:42 AM
Thanks for the link! Couldn't find the download by searching Apple's site and I like to push these out through Casper.
Posted on 10-17-2014 09:03 AM
Also these include the bash Update 1.0, as per https://support.apple.com/kb/HT6531 .
Posted on 10-17-2014 10:03 AM
Still shows as vulnerable using www.poodlestest.com. ??
Posted on 10-17-2014 10:39 AM
I am having the same results
Posted on 10-17-2014 10:41 AM
Hmm, same here. And I cleared the cache from the browser and restarted and everything. Still shows me a silly poodle image. Not sure what's up with that. Going to ping my Apple rep on this, because I even verified with him yesterday that these updates were supposed to address this issue.
Posted on 10-17-2014 10:43 AM
OK, looks like its only Safari for me at least. I just opened Firefox and went to http://poodletest.com and I see a terrier, not a poodle. This could just be Safari's ridiculously aggressive caching. I've run afoul of it not letting go of browser data and giving me bad results in the past.
More testing to be done obviously.
Looking again at the test site, I see this, which seems to indicate possible issues with Safari even with the patch applied-
Safari Apple stated that the Safari update released on Oct 17th no longer allows block ciphers via SSLv3. The test site (on purpose) only supports block ciphers as they are vulnerable to POODLE. However, my testing so far shows that Safari will still connect to the test site using ciphers like AES256. Safari should show up as not-vulnerable if it only supports stream ciphers over SSLv3.
Posted on 10-18-2014 07:40 PM
So long 10.7 Support!
Posted on 10-20-2014 06:59 AM
I can't find a reliable test that gives me a different response before and after the apple security update
Posted on 10-20-2014 07:03 AM
so it seems the poodletest etc sites just check for continued SSL3 connections, but apple's security fix does not do that, instead it blocks SSL connections use of "CBC ciphers" which are the root of the vulnerability. (I am reading this off the internets)
so, still need a reliable check that the vulnerability is patched. has anyone managed to craft an extension attribute?
Posted on 10-20-2014 07:19 AM
what are the right restart options for delivering this? the default is Current startup disk - that didn't work. I just tried the "(No Bless)" option, that didn't work either. both ways i get a regular reboot back to the login window :-/
(ie instead of a reboot, brief installer screen, reboot)
Posted on 10-20-2014 08:12 AM
I just can't automate this. I even tried resorting to installing the PKG to /tmp and running
installer -pkg /tmp/SecUpd2014-005Mavericks.pkg -target /
reboot
but no. It only works if I run it interactively!
I totally should have said I'm trialling most of this on VMware boxes. I did try it on one real machine with the two main restart options (mentioned above), but that behaved the same.
Posted on 10-20-2014 08:17 AM
you need a -target / as well
Posted on 10-20-2014 08:17 AM
oh, its here in the web version, not the email version sorry.
Posted on 10-20-2014 08:18 AM
why not just use casper to tell the computers to install all available software updates?
Posted on 10-20-2014 08:18 AM
Thanks dude - cross edited there, as I did have a -target. Also added that I've been hitting this mostly on trialling VMs
Posted on 10-20-2014 08:35 AM
hmm. i finally gave up on automating the real machine and ran it interactively on that and it didn't do the right thing either, so perhaps something was awry there (or it had taken earlier and I'd not noticed perhaps?!)
and i don't trust VMware to boot appropriately as the VM prefs take precedence
so perhaps I'll just try a few combos out on another physical machine now.
Cheers for advice though. I'll update this thread if I hit on anything
Posted on 10-20-2014 08:46 AM
oh man, this is no fun AT all.
This time I tried an install on a real machine (MacBook Air), policy set to run at logout: install, restart immediately, selected restart disk (no bless). This time before the restart happened I got a dialog titled "Unapproved caller" saying "SecurityAgent may only be invoked by Apple software". And again, it just rebooted to the loginwindow as normal (after the filevault was unlocked)
Posted on 10-21-2014 03:22 AM
Still elusive…
1 a reliable method to check that the security hole has been fixed (and an EA to record that)
2 a way to Casper automate delivery of the Apple pkg
3 why nobody else seems all that bothered by 1 and 2!
What's going on jamfnation?
Posted on 12-10-2014 06:13 AM
Has anyone seen problems applying the 2014-005 update from an internal SUS?
Posted on 12-10-2014 10:23 AM
Nope.
Does the update show as available if you run a "softwareupdate -l" command?
With the machine pointed to the internal SUS, have you tried running a "softwareupdate -i <nameofpackage>"?
Have you tried adding the package to Casper Admin and creating a policy to install it, with the checkbox to "Install Only If Available In Software Update" selected?