Apple Nukes Bogus Security Certificates With Latest Lion and Snow Leopard Security Update

Apple Nukes Bogus Security Certificates With Latest Lion and Snow Leopard Security Update

You might remember a security kerfuffle from a few weeks ago involving DigiNotar issuing compromised security certificates to websites after being hacked, including one for Gmail. Well, Apple’s just fixed that at the root level of OS X Lion and Snow Leopard 10.6.8 with the latest Security Update.

Here’s the release notes:

Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.1, Lion Server v10.7.1

Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information

Description: Fraudulent certificates were issued by multiple certificate authorities operated by DigiNotar. This issue is addressed by removing DigiNotar from the list of trusted root certificates, from the list of Extended Validation (EV) certificate authorities, and by configuring default system trust settings so that DigiNotar’s certificates, including those issued by other authorities, are not trusted.

To get the update, hit Software Update or download directly from here.

Related
  • Deputy Robert

    Is it safe to presume this issue has already been addressed for developers? I’m using a Mac Developer build–Mac OS X Lion 10.7.2 (11C48)–and find no way to implement a public-release update.

About the author

John BrownleeJohn Brownlee is a Contributing Editor. He has also written for Wired, Playboy, Boing Boing, Popular Mechanics, VentureBeat, and Gizmodo. He lives in Boston with his girlfriend and two parakeets. You can follow him here on Twitter.

(sorry, you need Javascript to see this e-mail address)| Read more posts by .

Posted in News |