Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article

To: for-q-clinton
Ok, finally an reasonable answer.

All of my responses to you have been reasonable.

So #1 is a problem that ships with the OS that is exploitable.

False. While it does ship with the OS, it is not part of the OS, and is not factory installed on the computer.

You use this and it will make you look the fool to anyone who knows the actual facts. There is also a difference between a vulnerability and an exploit and between an exploit and a proof-of-concept. At most, that is what this is... another proof-of-concept file that, in very unusual circumstances, could, if loaded with a maliciously designed URL, execute a PREVIOUSLY PLACED AND LOADED malicious application on the target computer. Tell me, for-q, how did that previously placed malicious application get placed on the MAc without the user's knowledge??? That's trivially easy to do on a Windows box... but not on a Mac.

There have been prior vulnerabilities in OS X and all that have been found have been repaired within a short period of time. The fix for this one is already available.

175 posted on 01/05/2007 5:08:25 PM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 163 | View Replies ]


To: Swordmaker
While it does ship with the OS, it is not part of the OS, and is not factory installed on the computer.

In the case of Apple, which I know *you* are specifically referring to, I agree. AntiRepublican and HAL are constantly trying to claim many of the same benefits Apple users enjoy automoatically apply to Linux as well, you see them trying to lump the two together constantly. It doesn't work that way, OSX from Apple and Linux from Red Hat for example are completey different products, install methods, and upgrade processes. Linux, unlike Apple, rarely comes preinstalled, and often patches for Linux have to come from the original vendor, not typically being modular or directly available from 3rd parties. So in your case with regard to most Apple, I agree, but when AR tries to claim that holes aren't in a linux distribution, he is wrong as a patch for that specific distribution is often required.

182 posted on 01/05/2007 5:39:20 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 175 | View Replies ]

To: Swordmaker
how did that previously placed malicious application get placed on the MAc without the user's knowledge??? That's trivially easy to do on a Windows box...

I think you'd probably admit in retrospect that was a broad generality that isn't accurate or justified.

183 posted on 01/05/2007 5:41:28 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 175 | View Replies ]

Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson