<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
   <channel>
      <title>Making Light :: Bleeping huge security hole :: comments</title>
      <link>http://nielsenhayden.com/makinglight/archives/005217.html#comments </link>
      <description>Language, fraud, folly, truth, history, and knitting. Et cetera.</description>
      <language>en</language>
      <lastBuildDate>Tue, 18 May 2004 22:22:42 -0500</lastBuildDate>
      <generator>http://www.sixapart.com/movabletype/?v=4.34-en</generator>
      
      <item>
      <title>Bleeping huge security hole</title>
      <description>If you have a Macintosh running OSX, you have a problem. Deal with it right now. Tonight. Seriously. IMO, the...</description>
      <content:encoded>If you have a Macintosh running OSX, you have a problem. Deal with it right now. Tonight. Seriously. IMO, the...</content:encoded>
      <link>http://nielsenhayden.com/makinglight/archives/005217.html</link>
      </item>

      
      <item>
         <title>Bleeping huge security hole -- comment #1 from Jay Allen</title>
         <description>comment from Jay Allen on 18.May.04</description>
         <content:encoded><![CDATA[<p><em>"It is possible to write a URL that, when invoked from one’s default browser, invokes Apple’s Help program, which is itself a mini-browser which uses a subset of HTML. The trouble is that unlike a well-written, full-fledged, OSX browser, the Help program is (a.) fully scriptable; and (b.) fully capable of running any application or command for which the user has privileges."</em></p>

<p>That is a pretty damn near perfect laymen's explanation.  </p>

<p><em>"This is where “rm -rf” and other nightmares come in. "</em></p>

<p>Well, I actually, that's where we're "lucky".  Due to a technical restriction, the command actually can't have any spaces in it.  Thank God for small miracles.</p>

<p>However, just before kicking off the help:// link, the malicious web page could launch a send your browser a "disk://..." URI which would download, say, a disk image to you which would be automatically mounted on your desktop (with or without the safe files checkbox checked mind you) and containing a shell script or Applescript contained inside with exactly the same instructions (Delete what you can).  </p>

<p>After THAT, the browser would send the "help://" URI with the path to the script in the mouted diskimage on your desktop.</p>

<p>Roundabout for sure, but not too hard to create.  THAT'S what scares me so much.  </p>

<p><em>"And I’m the Admin on this machine.</em></p>

<p>I'm curious.  Do you mean that you have superuser or root priviliges or are you using the default Mac OS X user?   You're not actually using the computer logged in as root are you? Eek!</p>

<p>Thanks for highlighting this on your blog, Teresa!</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:22 PM by Jay Allen&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48569</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48569</guid>
         <pubDate>Tue, 18 May 2004 22:22:42 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #2 from Yoon Ha Lee</title>
         <description>comment from Yoon Ha Lee on 18.May.04</description>
         <content:encoded><![CDATA[<p>Eek!  rm <i>bad</i> if I'm not the one doing it...</p>

<p>One comment in the first link suggests this applies only to Panther.  I'm still reading to find out whether I specifically need to do anything (I'm running Jaguar).</p>

<p>Thanks for pointing this out!</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:25 PM by Yoon Ha Lee&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48571</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48571</guid>
         <pubDate>Tue, 18 May 2004 22:25:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #3 from Chris Burkhardt</title>
         <description>comment from Chris Burkhardt on 18.May.04</description>
         <content:encoded><![CDATA[<p>No, I don't think it can run "rm -rf /", because the executable name can't have spaces in it (so you can't pass arguments to shell commands).</p>

<p>But what a malicious person CAN do is remotely mount a disk image which contains a script with no spaces in it's name which calls "rm -rf /", which is in turn executed by this flaw.</p>

<p>More complicated, but the same sad result :)</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:27 PM by Chris Burkhardt&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48573</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48573</guid>
         <pubDate>Tue, 18 May 2004 22:27:18 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #4 from Teresa Nielsen Hayden</title>
         <description>comment from Teresa Nielsen Hayden on 18.May.04</description>
         <content:encoded><![CDATA[<p>No no no. Not logged in as root. I'm not that imprudent.</p>

<p>The layman's version up there is word-for-word Patrick's explanation. He narrated, I transcribed.</p>

<p>Even if the commands are restricted, anything that can reach into my own desktop toolbar, fire up Terminal, and riffle through my files, is Plenty Bad Enough.</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:30 PM by Teresa Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48575</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48575</guid>
         <pubDate>Tue, 18 May 2004 22:30:05 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #5 from Chris Burkhardt</title>
         <description>comment from Chris Burkhardt on 18.May.04</description>
         <content:encoded><![CDATA[<p>d'oh, I'm slow and don't preview correctly even when I'm forced to. Sorry about that less understandable echo of Jay. :-[</p>

<p>Yoon: I haven't read whether this affects anything but Panther (though I rather suspect it does :-( )</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:30 PM by Chris Burkhardt&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48576</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48576</guid>
         <pubDate>Tue, 18 May 2004 22:30:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #6 from Teresa Nielsen Hayden</title>
         <description>comment from Teresa Nielsen Hayden on 18.May.04</description>
         <content:encoded><![CDATA[<p>Chris, you and Jay Allen vibrate as one.</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:32 PM by Teresa Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48577</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48577</guid>
         <pubDate>Tue, 18 May 2004 22:32:08 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #7 from Graydon</title>
         <description>comment from Graydon on 18.May.04</description>
         <content:encoded><![CDATA[<p>Teresa --</p>

<p>Why are you running anything so that your default shell's home directory is / ?</p>

<p>'Cause even without the horrid scary security hole, <i>you're</i> going to type the wrong thing someday; this is a law of nature.</p>

<p>rm -f * ~<br />
~ not found</p>

<p>is a programmer joke for a reason.  (The typical programmer editor uses ~ to indicate 'this is the backup file I made when I opened that file you told me to'; you want to clean those out from time to time, so, rm -f *~; if you get that space in there, and everyone has, <b>poof</b>, empty directory.)</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:34 PM by Graydon&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48578</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48578</guid>
         <pubDate>Tue, 18 May 2004 22:34:07 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #8 from Avram</title>
         <description>comment from Avram on 18.May.04</description>
         <content:encoded><![CDATA[<p>Oddly, More Internet wouldn’t let me use Chess as the substitute help app; it said Chess didn’t have a creator code. I used <a href="http://www.wunderbear.com/cuppa/" rel="nofollow">Cuppa</a> instead. I’m using an old version of More Internet, which is probably the trouble. </p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:37 PM by Avram&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48580</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48580</guid>
         <pubDate>Tue, 18 May 2004 22:37:20 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #9 from Patrick Nielsen Hayden</title>
         <description>comment from Patrick Nielsen Hayden on 18.May.04</description>
         <content:encoded><![CDATA[<p><em>"I'm curious. Do you mean that you have superuser or root priviliges or are you using the default Mac OS X user? You're not actually using the computer logged in as root are you? Eek!"</em></p>

<p>Not to worry.  Teresa merely has "admin" privileges on her blue-and-white G3.  She isn't running as root.</p>

<p>Of course, root <em>is</em> enabled, and she <em>is</em> the Empress of the Universe, so at any moment frogs might rain out of the sky, sheep might give birth to cows, and the <a href="http://fafblog.blogspot.com" rel="nofollow">Medium Lobster</a> might be invited to join <a href="http://crookedtimber.org" rel="nofollow">Crooked Timber</a>, but those are the risks we live with in order to run a truly modern, multitasking, multi-threaded, hypersonic, scriptable, POSIX-compliant, cinnamon-flavored OS with moisture-trapping action.  In which, naturally, Microsoft Word takes 45 to 90 seconds to launch.  It's <em>good</em> that some things never change.</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:38 PM by Patrick Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48582</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48582</guid>
         <pubDate>Tue, 18 May 2004 22:38:20 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #10 from Patrick Nielsen Hayden</title>
         <description>comment from Patrick Nielsen Hayden on 18.May.04</description>
         <content:encoded><![CDATA[<p>Graydon, there there.  Teresa's home directory isn't actually at /.  Niiiiiice literal-minded geek.  Put the torches down and let's have story time now.</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:40 PM by Patrick Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48583</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48583</guid>
         <pubDate>Tue, 18 May 2004 22:40:26 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #11 from Teresa Nielsen Hayden</title>
         <description>comment from Teresa Nielsen Hayden on 18.May.04</description>
         <content:encoded><![CDATA[<p>Don't mind us. We're giggly with relief at getting that hole plugged.</p>

<p>I would never keep all my files in one directory. I'm constitutionally incapable of being that tidy and consistent. I wish I were, but I'm not.</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:44 PM by Teresa Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48586</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48586</guid>
         <pubDate>Tue, 18 May 2004 22:44:08 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #12 from James D. Macdonald</title>
         <description>comment from James D. Macdonald on 18.May.04</description>
         <content:encoded><![CDATA[<p>This is a flaw in OS X, not in a particular browser.  The hole works in MSIE, Firefox, Safari, Mozilla, Camino....</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:45 PM by James D. Macdonald&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48587</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48587</guid>
         <pubDate>Tue, 18 May 2004 22:45:03 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #13 from melissa</title>
         <description>comment from melissa on 18.May.04</description>
         <content:encoded><![CDATA[<p>Thanks for the information - fixing my system now. I greatly appreicate the helpful advice as well as the great humor <br />
(the last posting...)</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:49 PM by melissa&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48588</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48588</guid>
         <pubDate>Tue, 18 May 2004 22:49:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #14 from Graydon</title>
         <description>comment from Graydon on 18.May.04</description>
         <content:encoded><![CDATA[<p>Patrick, tonight is the night I accidentally cooked rice in vinegar and buffalo blood, and it was good.  I'm not presently willing to put strong limits on the possible strangeness of the universe.</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:51 PM by Graydon&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48590</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48590</guid>
         <pubDate>Tue, 18 May 2004 22:51:26 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #15 from Patrick Nielsen Hayden</title>
         <description>comment from Patrick Nielsen Hayden on 18.May.04</description>
         <content:encoded><![CDATA[<p>Mostly, in fact, Teresa keeps her actual working files on the jiant external FireWire drive, and leaves her OS X "home directory" to be colonized by Microsoft Office config settings, AIM log files, Mail.app mailboxes, miscellaneous files on the Desktop, and the like.</p>

<p>I suspect a lot of migrators from OS 9 and before do the same.  One of the glories of the old Mac OS was its liberality about file location.  Expecting its habitues to adopt the rigors of Windows- or Unix-style filesystem organization is like asking Quakers to take up the Tridentine Mass. It's theoretically possible, but it isn't actually going to happen.</p>

<p>(Of course, the fact that Apple let Microsoft colonize the userspace "Documents" directory with its farking Office preferences folder didn't help, either.)</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:51 PM by Patrick Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48591</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48591</guid>
         <pubDate>Tue, 18 May 2004 22:51:47 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #16 from Matt McIrvin</title>
         <description>comment from Matt McIrvin on 18.May.04</description>
         <content:encoded><![CDATA[<p>This all sounds legit, and More Internet looks like an app I need to get anyway.</p>

<p>But it's also worth mentioning to the people out there in Internet-land that if somebody says "There is a security hole in your computer!!! Quick, fix it, now!  The way to do it is to <em>download and install the following application</em>..." and you don't at least do a little sanity checking before following directions, then you have a security hole in your brain.</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:52 PM by Matt McIrvin&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48592</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48592</guid>
         <pubDate>Tue, 18 May 2004 22:52:59 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #17 from Matt McIrvin</title>
         <description>comment from Matt McIrvin on 18.May.04</description>
         <content:encoded><![CDATA[<p>...And, by the way, Patrick wasn't in fact advocating that people do that, so I hope nobody thought I was accusing him of it.</p>]]>
	 &lt;p&gt;Posted May 18, 2004 10:55 PM by Matt McIrvin&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48593</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48593</guid>
         <pubDate>Tue, 18 May 2004 22:55:42 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #18 from chance</title>
         <description>comment from chance on 18.May.04</description>
         <content:encoded><![CDATA[<p>woof.  thanks.</p>]]>
	 &lt;p&gt;Posted May 18, 2004 11:01 PM by chance&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48594</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48594</guid>
         <pubDate>Tue, 18 May 2004 23:01:21 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #19 from Joseph Holmes</title>
         <description>comment from Joseph Holmes on 18.May.04</description>
         <content:encoded><![CDATA[<p>I'm always skeptical about these Mac OS X security flaws (so far, not a one has actually been exploited), but I've taken this one seriously because I trust the people reporting it and because it's such an easy, painless fix. But as I said, so far, this one exists in theory. No one has yet exploited it. And every few hours we seem to find a new wrinkle ("actually it can't run "rm -rf /", because..."</p>

<p>Nonetheless, um, I *have* taken the precautions. I like the little utility here: http://isophonic.net/</p>

<p>-=-Joe</p>]]>
	 &lt;p&gt;Posted May 18, 2004 11:01 PM by Joseph Holmes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48595</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48595</guid>
         <pubDate>Tue, 18 May 2004 23:01:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #20 from Teresa Nielsen Hayden</title>
         <description>comment from Teresa Nielsen Hayden on 18.May.04</description>
         <content:encoded><![CDATA[<p>I want to know how Graydon did that. </p>

<p>Accidentally? Cooked? In buffalo's blood? </p>

<p><i>What?</i></p>

<p>Graydon, are you channeling James Nicoll?</p>]]>
	 &lt;p&gt;Posted May 18, 2004 11:49 PM by Teresa Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48599</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48599</guid>
         <pubDate>Tue, 18 May 2004 23:49:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #21 from Yoon Ha Lee</title>
         <description>comment from Yoon Ha Lee on 19.May.04</description>
         <content:encoded><![CDATA[<p>--in case it's of interest to anyone, the exploit did indeed affect 10.2.6.  Now that my headache has abated, I've patched it.  Joseph Holmes, thanks for the link; it worked like a charm.</p>]]>
	 &lt;p&gt;Posted May 19, 2004 12:03 AM by Yoon Ha Lee&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48600</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48600</guid>
         <pubDate>Wed, 19 May 2004 00:03:26 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #22 from Nancy Hanger</title>
         <description>comment from Nancy Hanger on 19.May.04</description>
         <content:encoded><![CDATA[<p>Strangely enough, it launches Help in 10.2.8, but Terminal doesn't start up (and, yes, I have Terminal on this machine and use it all the time).</p>

<p>(On this iBook, it launches Help, and then tells me it doesn't have a program associated with running "a du file" -- which makes me think it tried to launch Terminal but couldn't for reasons unclear to me.)</p>]]>
	 &lt;p&gt;Posted May 19, 2004 12:25 AM by Nancy Hanger&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48606</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48606</guid>
         <pubDate>Wed, 19 May 2004 00:25:08 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #23 from Graydon</title>
         <description>comment from Graydon on 19.May.04</description>
         <content:encoded><![CDATA[<p>Teresa --</p>

<p>I mistook the small container of leftover marinade for the small container of dripping.</p>

<p>The butcher shop I favour had buffalo stew meat on for six bucks a pound a week or so back, but it needed marinading, being of its nature rather tough.  The leftover marinade was mostly cider vinegar and blood with the odd bit of herbs and spices, as per usual, but I thought I might get to use it again.  Wasn't expecting to cook rice in it, though.</p>

<p>One of those culinary things one isn't sure one dares try to do again on purpose.</p>]]>
	 &lt;p&gt;Posted May 19, 2004 12:26 AM by Graydon&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48607</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48607</guid>
         <pubDate>Wed, 19 May 2004 00:26:38 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #24 from Madeleine Robins</title>
         <description>comment from Madeleine Robins on 19.May.04</description>
         <content:encoded><![CDATA[<p>Can anyone confirm that this Nasty Thingy only affects Panther and not earlier versions of OS X?  Inquiring minds want to know...</p>]]>
	 &lt;p&gt;Posted May 19, 2004 12:33 AM by Madeleine Robins&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48611</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48611</guid>
         <pubDate>Wed, 19 May 2004 00:33:03 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #25 from Will &quot;scifantasy&quot; Frank</title>
         <description>comment from Will "scifantasy" Frank on 19.May.04</description>
         <content:encoded><![CDATA[<p>Well, once I read this I tried to see if I should fix it for my sister's iMac (OS 10 or 10.1 at latest), and it didn't work...so I'd lean towards "not the earliest versions of OS X." As to Jaguar, I dunno.</p>]]>
	 &lt;p&gt;Posted May 19, 2004 12:47 AM by Will &quot;scifantasy&quot; Frank&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48616</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48616</guid>
         <pubDate>Wed, 19 May 2004 00:47:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #26 from Will &quot;scifantasy&quot; Frank</title>
         <description>comment from Will "scifantasy" Frank on 19.May.04</description>
         <content:encoded><![CDATA[<p>Clarify: The hole wasn't there. It couldn't run "du" in the demo case.</p>]]>
	 &lt;p&gt;Posted May 19, 2004 12:48 AM by Will &quot;scifantasy&quot; Frank&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48617</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48617</guid>
         <pubDate>Wed, 19 May 2004 00:48:13 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #27 from Yoon Ha Lee</title>
         <description>comment from Yoon Ha Lee on 19.May.04</description>
         <content:encoded><![CDATA[<p>Nancy, clearly I wasn't as much past the headache as I thought.  The &quot;du&quot; thing was what happened to me, too, so the hole wasn't there (10.2.6).  Nevertheless.</p>]]>
	 &lt;p&gt;Posted May 19, 2004 12:59 AM by Yoon Ha Lee&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48619</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48619</guid>
         <pubDate>Wed, 19 May 2004 00:59:44 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #28 from Lenny Bailes</title>
         <description>comment from Lenny Bailes on 19.May.04</description>
         <content:encoded><![CDATA[<p>This sounds like it's similar to a "buffer overun" flaw in the Windows XP help program.  (There's a patch for that <a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=F699BB98-CF57-4E5E-A13F-CD04D4D94308&displaylang=en" rel="nofollow">here.</a>) </p>]]>
	 &lt;p&gt;Posted May 19, 2004  1:32 AM by Lenny Bailes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48628</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48628</guid>
         <pubDate>Wed, 19 May 2004 01:32:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #29 from Phill</title>
         <description>comment from Phill on 19.May.04</description>
         <content:encoded><![CDATA[<p>This is actually a completely different class of bug to the buffer overrun bugs that are often reported in Microsoft code (and are endemic in almost programs written in C or C++, including most of the Unix O/S).</p>

<p>There is a work arround for the spaces issue, so yes you can run rm -f / if you know how, so fix the damn thing before the work arround is more widely known (and don't bother asking me what it is you don't need to know).<br />
</p>]]>
	 &lt;p&gt;Posted May 19, 2004  1:39 AM by Phill&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48630</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48630</guid>
         <pubDate>Wed, 19 May 2004 01:39:51 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #30 from Julia Jones</title>
         <description>comment from Julia Jones on 19.May.04</description>
         <content:encoded><![CDATA[<p>I'm glad I wasn't the only one who thought that Graydon was channelling James - and even more glad that there was a rational explanation. :-)</p>]]>
	 &lt;p&gt;Posted May 19, 2004  1:43 AM by Julia Jones&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48632</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48632</guid>
         <pubDate>Wed, 19 May 2004 01:43:08 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #31 from David Goldfarb</title>
         <description>comment from David Goldfarb on 19.May.04</description>
         <content:encoded><![CDATA[<p><i>Oddly, More Internet wouldn’t let me use Chess as the substitute help app; it said Chess didn’t have a creator code.</i></p>

<p>The version I downloaded accepted Chess without a qualm.  (And I did try going back to the demo URL, and it did start up Chess.)</p>]]>
	 &lt;p&gt;Posted May 19, 2004  1:44 AM by David Goldfarb&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48633</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48633</guid>
         <pubDate>Wed, 19 May 2004 01:44:45 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #32 from super bun bun</title>
         <description>comment from super bun bun on 19.May.04</description>
         <content:encoded><![CDATA[<p>Not that I am about to try, but it might be possible to add that elusive space by URL-encoding the string. To add a space, you would simply put %20 in its place. So the command would look something like:</p>

<p>"help:runscript=MacHelp.help/Contents/Resources/English.lproj/shrd/OpnApp.scpt string='usr:bin:rm%20-rf"</p>

<p>Has this been tried yet?</p>]]>
	 &lt;p&gt;Posted May 19, 2004  2:47 AM by super bun bun&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48640</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48640</guid>
         <pubDate>Wed, 19 May 2004 02:47:54 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #33 from Charlie Stross</title>
         <description>comment from Charlie Stross on 19.May.04</description>
         <content:encoded><![CDATA[<p>Hmm.</p>

<p>I tried setting the help:// handler to invoke XCode so I could see (and edit, and debug ...) whateverthehell it is that anyone exploiting the hole is throwing at me. Sadly, XCode doesn't seem to want to open the test scriptlets. </p>

<p>Must dig further into the OS/X developer docs ...</p>]]>
	 &lt;p&gt;Posted May 19, 2004  5:56 AM by Charlie Stross&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48654</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48654</guid>
         <pubDate>Wed, 19 May 2004 05:56:51 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #34 from John (B).</title>
         <description>comment from John (B). on 19.May.04</description>
         <content:encoded><![CDATA[<p>Just in case there are any people out there who are hesitant to act on this lest it prove to be an urban myth, MacFixIt now has a late breaker up on their site about this problem at the following URL:</p>

<p>http://www.macfixit.com/article.php?story=20040519024257161</p>

<p>I'll report back if I encounter any problems running the work around...</p>]]>
	 &lt;p&gt;Posted May 19, 2004  6:48 AM by John (B).&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48656</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48656</guid>
         <pubDate>Wed, 19 May 2004 06:48:57 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #35 from Jay Allen</title>
         <description>comment from Jay Allen on 19.May.04</description>
         <content:encoded><![CDATA[<p><em>Chris, you and Jay Allen vibrate as one.</em></p>

<p>Oh God.  Please, no one tell my girlfriend.</p>

<p><em>if somebody says "There is a security hole in your computer!!! Quick, fix it, now! The way to do it is to download and install the following application..." and you don't at least do a little sanity checking before following directions, then you have a security hole in your brain.</em></p>

<p>I get what you're saying and on principle, I agree with you.  However, in this case seeing a hole in my operating system large enough to drive a Mack truck through pretty much gave me enough confidence that it was the right move.  It was neither subtle nor theoretical.</p>]]>
	 &lt;p&gt;Posted May 19, 2004  7:32 AM by Jay Allen&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48659</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48659</guid>
         <pubDate>Wed, 19 May 2004 07:32:12 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #36 from Graydon</title>
         <description>comment from Graydon on 19.May.04</description>
         <content:encoded><![CDATA[<p>Julia --</p>

<p>Despite James' greater skill with anecdote and my lesser tendency to scar, I have not had a life so free of odd and surprising trauma as it seems you must suppose.</p>]]>
	 &lt;p&gt;Posted May 19, 2004  8:10 AM by Graydon&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48665</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48665</guid>
         <pubDate>Wed, 19 May 2004 08:10:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #37 from Erik V. Olson</title>
         <description>comment from Erik V. Olson on 19.May.04</description>
         <content:encoded><![CDATA[<p>1) This hole's pretty serious, but not the worst I've seen. Still, it's a bad hole. "patch &lt;spackle &gt;hole".</p>

<p>2) Jay - being an "Administrator" on OS X basically means that you have sudo usage rights. In the GUI, it means you can change the "locked/unlocked" status of the system control panels, and if you run an installer that needs admin privs (translation, calls sudo) your password, not the root password, is enough. Many, I'd even say most, OS X installations don't have the root account active at all. </p>

<p>There is a danger here -- if you've run something that fires sudo and asks you for the password, then this hole exploits "sudo rm -rf /", you've just lost.</p>

<p>3) Graydon -- no, OS X doesn't use / as the home directory for anyone, not even root (if you've enable the account.) </p>

<p>4) TNH -- however, just because your root doesn't mean this wouldn't hurt. If this script kicked off "rm -rf", the most likely place that command would run is in your home directory -- and since you almost certainly do have rights on everything in that directory, it would delete them all.</p>

<p>5) Phill -- is spot on. There's ways around the space issues, and fixing it is the right thing to do. And I'll quote Bruce Schneier "Patching doesn't work" and me "But patch anyway, since not patching is even worse."</p>

<p>6) In general. Any exploit that allows you to run a command with privs is one that can be exploited.  Thus, even local exploits are worth patching. The combo that occurs is a remote, non-root exploit (which gets them on your box, but only as a user) and then a local root exploit (which lets them own the box.) Attacking a box from a local account is much easier than attacking remotely and gettint root privs right away. </p>]]>
	 &lt;p&gt;Posted May 19, 2004  8:18 AM by Erik V. Olson&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48666</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48666</guid>
         <pubDate>Wed, 19 May 2004 08:18:26 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #38 from Jay Allen</title>
         <description>comment from Jay Allen on 19.May.04</description>
         <content:encoded><![CDATA[<blockquote>
<p>
<em>Jay - being an "Administrator" on OS X basically means that you...</em>
</p>
</blockquote>

<p>Heh, thanks Erik.  I'm aware.  I've got one of those first generation Titanium lapwarmers doing its job.  I simply wanted to be sure that Teresa wasn't doing day-to-day stuff logged in as root.</p>]]>
	 &lt;p&gt;Posted May 19, 2004 10:22 AM by Jay Allen&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48676</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48676</guid>
         <pubDate>Wed, 19 May 2004 10:22:11 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #39 from Peter da Silva</title>
         <description>comment from Peter da Silva on 19.May.04</description>
         <content:encoded><![CDATA[<p>This is exactly why I have been pushing in every forum I can, and sending feedback to Apple, for the past several months, urging that they back away from the increasing integration between the browser and other applications. Having a single set of bindings for trusted and untrusted sources is why Internet Explorer and Outlook have been security nightmares for most of the past decade.</p>

<p>I can understand Microsoft doing this: they have political reasons for "integrating" the desktop and the browser (they're not good reasons... trying to weasel out of an agreement with the DoJ is never a good reason). I can't understand Apple, though: there should be at least *two* unrelated sets of bindings... one to be used for applications that work with local documents and one for applications that work with untrusted documents... and the bindings for applications that work with untrusted documents should be *absolutely* minimal.</p>

<p>In fact, by default and in the absence of explicit uuser action nothing should ever be transferred from an untrusted document to another application, or any integration of trusted and untrusted namespaces. That includes:</p>

<p>Helper application for URL protocols (eg help:)<br />
Helper applications for mime types (eg video/windows-media)<br />
Helper applications for file extensions (eg .wma, .zip)<br />
Internet-enabled disk images and installers.</p>

<p>If the target application is not known to be suitable for handling untrusted data, it must not be passed untrusted data.</p>

<p>If an application is known to be suitable for handling untrusted data, it must not be presented with helper applications that aren't similarly trusted.</p>

<p>This is a really basic security principle, one that nobody I know would have imagined would be commonly violated until Microsoft not only kicked it over but refused to pick it up again. For gods' sake, folks, don't accept the same insanity from Apple, and don't let Apple get away with a one-shot patch just for this specific instance of the problem... that way lies the Outlook-exploit-of-the-week syndrome.</p>]]>
	 &lt;p&gt;Posted May 19, 2004 10:27 AM by Peter da Silva&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48677</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48677</guid>
         <pubDate>Wed, 19 May 2004 10:27:45 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #40 from Jill Smith</title>
         <description>comment from Jill Smith on 19.May.04</description>
         <content:encoded><![CDATA[<p>The More Internet disk image doesn't mount on my machine (iBook, Panther).  It is "not recognized."</p>

<p>Wha?</p>]]>
	 &lt;p&gt;Posted May 19, 2004 10:35 AM by Jill Smith&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48681</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48681</guid>
         <pubDate>Wed, 19 May 2004 10:35:23 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #41 from Dan Blum</title>
         <description>comment from Dan Blum on 19.May.04</description>
         <content:encoded><![CDATA[<blockquote>I would never keep all my files in one directory. I'm constitutionally incapable of being that tidy and consistent. I wish I were, but I'm not.</blockquote>
<p>I think this must be another one of those basic dichotomies of the universe.  I tend to keep everything in one directory (e.g., 26,000 e-mails in Outlook), but I think of this as being <i>untidy</i> - I can't be bothered to sort things, mostly.  I do much the same thing with paper - make a big stack and shuffle through it when I need something. </p>]]>
	 &lt;p&gt;Posted May 19, 2004 11:49 AM by Dan Blum&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48694</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48694</guid>
         <pubDate>Wed, 19 May 2004 11:49:13 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #42 from Dan Hoey</title>
         <description>comment from Dan Hoey on 19.May.04</description>
         <content:encoded><![CDATA[<p>Matt McIrvin:<blockquote><i>This all sounds legit, and More Internet looks like an app I need to get anyway.</i></blockquote><blockquote><i>But it's also worth mentioning to the people out there in Internet-land that if somebody says "There is a security hole in your computer!!! Quick, fix it, now! The way to do it is to download and install the following application..." and you don't at least do a little sanity checking before following directions, then you have a security hole in your brain.</i></blockquote><p>I'm very, very paranoid on exactly that issue.  Fortunately, you don't have to download any of those tools.  You should have Internet Explorer on your OSX (even if you're wise enough not to use it for browsing) and IE's "Protocol helpers" preferences allow you to fix this problem.  Just change the "help" and "disk" helpers to an innocuous app like Chess.  I wanted to use Calculator, but that doesn't work for some reason, so whatever you use, test it.</p><p>Thanks to <a href="http://www.jayallen.org/journey/2004/05/mac_os_x_highly_critical_security_flaw#comment-7396" rel="nofollow">Leif</a>, on Jay Allen's blog, for this fix.</p></p>]]>
	 &lt;p&gt;Posted May 19, 2004  1:49 PM by Dan Hoey&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48717</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48717</guid>
         <pubDate>Wed, 19 May 2004 13:49:42 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #43 from Dan Hoey</title>
         <description>comment from Dan Hoey on 19.May.04</description>
         <content:encoded><![CDATA[<p>Jay: <i>I get what you're saying and on principle, I agree with you. However, in this case seeing a hole in my operating system large enough to drive a Mack truck through pretty much gave me enough confidence that it was the right move. It was neither subtle nor theoretical.</i><p>Oddly enough, it was just this feature of the problem that made me more paranoid than usual.  The technique of scaring people into doing something unwise is one of the big malware pumps on the net right now.  It might even be more effective than the lures, since it pushes the victims so fast.</p><p>That's not to say that I have any reason to distrust moreInternet, misfox, or vince, other than the feeling of being pushed at them.  But I'm very relieved that Internet Explorer can be used to fix the problem.  And I didn't browse from a MacOSX system to search for the fix.</p></p>]]>
	 &lt;p&gt;Posted May 19, 2004  2:27 PM by Dan Hoey&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48725</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48725</guid>
         <pubDate>Wed, 19 May 2004 14:27:11 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #44 from Clark E Myers</title>
         <description>comment from Clark E Myers on 19.May.04</description>
         <content:encoded><![CDATA[<p>Notice the social engineering was done long ago in an early Java sandbox - the sandbox considered type a directory to the console (but not to a network  device) a perfectly safe command of purely local interest and so permitted it in all cases. </p>

<p>The social engineering was to have a website order a directory to the screen and display fixed text of <i>we are now</i> pick one <i> reading or copying or deleting the following files</i> none of this was happening.</p>

<p>Followed by panic followed by a chance to do the wrong thing.</p>

<p>I wonder who teaches social engineering, I'd like to read their texts.</p>]]>
	 &lt;p&gt;Posted May 19, 2004  2:42 PM by Clark E Myers&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48737</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48737</guid>
         <pubDate>Wed, 19 May 2004 14:42:17 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #45 from EKM</title>
         <description>comment from EKM on 19.May.04</description>
         <content:encoded><![CDATA[<p>You can disable this exploit by removing the execute permissions of Help <br />
Viewer.app.<br /><br />
As root issue a <i><b>chmod 744 /System/Library/CoreServices/Help\ <br />
Viewer.app/</b></i><br /><br />
If you need to use Help Viewer.app afterwards just restore the <br />
execute privileges to the wheel or other groups as appropriate. A small <br />
bother, you don't even have to trust a third party utility. Once Apple fixes this <br />
you can leave the execute permissions on again. The path might be different in earlier version of OS X.<br />
<br /><br />
-EKM</p>]]>
	 &lt;p&gt;Posted May 19, 2004  5:58 PM by EKM&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48781</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48781</guid>
         <pubDate>Wed, 19 May 2004 17:58:02 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #46 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 20.May.04</description>
         <content:encoded><![CDATA[<p>Oh, my aching head. I'm running OS 10.2.8--does the hole affect me or not? (I've just spent over 2 days trying to fix a multitude of Classic problems, and have no more room in my head for understanding MacOS problems. Sigh.) Help!</p>]]>
	 &lt;p&gt;Posted May 20, 2004 11:02 AM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48866</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48866</guid>
         <pubDate>Thu, 20 May 2004 11:02:05 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #47 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 20.May.04</description>
         <content:encoded><![CDATA[<p>Oh, my aching head. I'm running OS 10.2.8--does the hole affect me or not? (I've just spent over 2 days trying to fix a multitude of Classic problems, and have no more room in my head for understanding MacOS problems. Sigh.) Help!</p>]]>
	 &lt;p&gt;Posted May 20, 2004 11:03 AM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48867</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48867</guid>
         <pubDate>Thu, 20 May 2004 11:03:23 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #48 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 20.May.04</description>
         <content:encoded><![CDATA[<p>Oh, my aching head. I'm running OS 10.2.8--does the hole affect me or not? (I've just spent over 2 days trying to fix a multitude of Classic problems, and have no more room in my head for understanding MacOS problems. Sigh.) Help!</p>]]>
	 &lt;p&gt;Posted May 20, 2004 11:05 AM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48868</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48868</guid>
         <pubDate>Thu, 20 May 2004 11:05:32 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #49 from Jay Allen</title>
         <description>comment from Jay Allen on 20.May.04</description>
         <content:encoded><![CDATA[<p>Yes, I do believe that ALL 10.2.x systems are affected.  See the section entitled "System applicability" on my <a href="http://www.jayallen.org/journey/2004/05/mac_os_x_highly_critical_security_flaw#comment-7314" rel="nofollow">updated post</a> for more on that.</p>

<p>In addition, <a href="http://mamamusings.net/archives/2004/05/18/serious_os_x_security_problem.php#3001" rel="nofollow">the telnet:// protocol is also exploitable</a>.  It's not as serious because arbitrary remote commands can't be executed, however an attacker can overwrite (zeroing-out) any file that a user has write permissions on.  </p>]]>
	 &lt;p&gt;Posted May 20, 2004 12:22 PM by Jay Allen&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48879</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48879</guid>
         <pubDate>Thu, 20 May 2004 12:22:38 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #50 from erik nelson</title>
         <description>comment from erik nelson on 20.May.04</description>
         <content:encoded><![CDATA[<p>would simply changing the priveleges of the Help Viewer be a sufficient fix?</p>]]>
	 &lt;p&gt;Posted May 20, 2004 12:56 PM by erik nelson&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48882</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48882</guid>
         <pubDate>Thu, 20 May 2004 12:56:44 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #51 from Dan Hoey</title>
         <description>comment from Dan Hoey on 20.May.04</description>
         <content:encoded><![CDATA[<p>erik nelson: <i>would simply changing the priveleges of the Help Viewer be a sufficient fix?</i><p>No, it wouldn't affect the problems with the "disk" and "telnet" URI's at all.  Anyway, I'd think running Internet Explorer (for its "Protocol Helpers" preference pane) would be easier for most users.  Have people really gone to the trouble of deinstalling IE?  Or is there a release of OSX that doesn't install it by default?<br />
</p></p>]]>
	 &lt;p&gt;Posted May 20, 2004  2:17 PM by Dan Hoey&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48896</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48896</guid>
         <pubDate>Thu, 20 May 2004 14:17:05 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #52 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 20.May.04</description>
         <content:encoded><![CDATA[<p>Is it enough to disable the "open safe files after downloading"?</p>]]>
	 &lt;p&gt;Posted May 20, 2004  4:35 PM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48929</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48929</guid>
         <pubDate>Thu, 20 May 2004 16:35:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #53 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 20.May.04</description>
         <content:encoded><![CDATA[<p>(By the way, sorry for the inadvertent earlier triple post--I only sent it once, honest!)</p>]]>
	 &lt;p&gt;Posted May 20, 2004  4:37 PM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48931</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48931</guid>
         <pubDate>Thu, 20 May 2004 16:37:16 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #54 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 20.May.04</description>
         <content:encoded><![CDATA[<p>Okay, never mind. I surrender. I cannot do just the minimum and expect it to work. I dutifully downloaded More Internet and redirected help, disk (after having to add it, it didn't turn up automatically in the list), and telnet to a game on my disk that I don't play. (MoreInternet wouldn't let me use Chess, I don't know why.) I've disabled the open-safe-documents preference. I bow to OS experts.</p>

<p>This has been a very bad week for me with MacOSs.</p>

<p>I'm starting to think that typewriters had their points.</p>]]>
	 &lt;p&gt;Posted May 20, 2004  5:13 PM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48943</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48943</guid>
         <pubDate>Thu, 20 May 2004 17:13:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #55 from Yoon Ha Lee</title>
         <description>comment from Yoon Ha Lee on 20.May.04</description>
         <content:encoded><![CDATA[<p>Rachel Reiss: you're not alone.  I love my Mac, but I feel longing for a typewriter.  And I'm pretty sure I learned on a manual, and wouldn't mind one of <i>those</i> to play with.  (Yes, I'm weird.)</p>]]>
	 &lt;p&gt;Posted May 20, 2004  6:54 PM by Yoon Ha Lee&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48956</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48956</guid>
         <pubDate>Thu, 20 May 2004 18:54:23 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #56 from Alan Hamilton</title>
         <description>comment from Alan Hamilton on 20.May.04</description>
         <content:encoded><![CDATA[<p>There are three ways of dealing with the "I can't use a space here" problem in Unix/Linux/*nix: quoting, escaping, or substitution.  Generally, one or more in combination will solve the problem.</p>

<p>Quoting is just "quote marks" or 'quote marks'. The main difference between " and ' is whether the shell will process what's in the quotes or not. 'My name is $HOSTNAME' will return the literal text My name is $HOSTNAME, while "My name is $HOSTNAME" will return My name is actual.machine.name.com .</p>

<p>Escaping is using a backslash to remove the special meaning of a character. This\ is\ escaped. The shell will consider that one word, not three as the backslash removes the special meaning of "separates a word" from the space.  You can use it on other problem characters. "Quote marks (\") can be escaped". This lets you use a quote in the middle without closing the quoted text.</p>

<p>The tricky one is substitution. You use something that the shell considers a space, but but doesn't look like a space to other programs. For example, cd /usr requires typing a space between cd and /usr.  Or not: cd${IFS}/usr. The $IFS is the <a href="http://www.livefirelabs.com/unix_tip_trick_shell_script/oct_2003/10132003.htm" rel="nofollow">Internal Field Separator</a>.  It contains the characters the shell will use to divide up words.  The curly brackets {} prevent it from running into the text that follows it.</p>]]>
	 &lt;p&gt;Posted May 20, 2004  9:14 PM by Alan Hamilton&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48969</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48969</guid>
         <pubDate>Thu, 20 May 2004 21:14:39 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #57 from Kathy Li</title>
         <description>comment from Kathy Li on 20.May.04</description>
         <content:encoded><![CDATA[<p>Went looking at <a href="http://saladwithsteve.com/osx/" rel="nofollow">Forwarding Address: OS X</a>, which mentions a better fix than More Internet, <a href="http://www.rubicode.com/Software/RCDefaultApp/" rel="nofollow">RCDefaultApp</a>. It's a Preference Pane.</p>

<p>If I understand correctly, the vulnerability can also be exploited through the disk:// and disks:// protocols, which don't show up in MisFox or More Internet.  Additionally, there's a "disable" setting.  (I had actually hooked help:// up to <a href="http://www.daniele.ch/downloads.html" rel="nofollow">BioRhythm X</a> :-).</p>]]>
	 &lt;p&gt;Posted May 20, 2004  9:15 PM by Kathy Li&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48970</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48970</guid>
         <pubDate>Thu, 20 May 2004 21:15:46 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #58 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 20.May.04</description>
         <content:encoded><![CDATA[<p>Oh, I learned on a manual too--my mother's old college typewriter. I loved that thing, she let me use it when I was still in grade school, I felt so grown up. And I spent quite a bit of time poking at it until I figured out exactly how it worked, which meant I could at least understand what was wrong when it didn't work, which I can't, mostly, with my Mac. (And I love my Mac too, I have a 17" flat panel iMac, it's nice to look at and it does everything I need a computer to do. When it works. Which right now it doesn't, so much.)</p>]]>
	 &lt;p&gt;Posted May 20, 2004  9:16 PM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48971</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48971</guid>
         <pubDate>Thu, 20 May 2004 21:16:31 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #59 from Daniel Martin</title>
         <description>comment from Daniel Martin on 20.May.04</description>
         <content:encoded><![CDATA[<p>Ew.  Ew Ew Ew Ew Ew.  Attacks like this are especially nasty because they can be triggered by <a href="http://www.cgisecurity.com/articles/xss-faq.shtml" rel="nofollow">Cross site scripting</a> attacks, so that it becomes dangerous even to follow links to sites you know and trust.</p>

<p>For example, you'd never expect <a href="http://nielsenhayden.com/makinglight/commentlist-oneauthor.php?author=%3Cscript%3Ealert(8675309)%3C/script%3E&email=rereader@att.net" rel="nofollow">a link to nielsenhayden.com</a> to trigger a javascript window showing a famous phone number, would you?  Cross-site scripting attacks require constant vigilance to root out, and can erase the distinction between "safe" and "unsafe" sites.  In the past, cross-site scripting attacks against some of the builtin pages on internet explorer (which bypasses ie's security) have caused Microsoft some embarassment.</p>]]>
	 &lt;p&gt;Posted May 20, 2004 10:24 PM by Daniel Martin&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#48977</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#48977</guid>
         <pubDate>Thu, 20 May 2004 22:24:24 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #60 from Ben Zvan</title>
         <description>comment from Ben Zvan on 21.May.04</description>
         <content:encoded><![CDATA[<p>I just looked at the terrifying demo and, acting without reading further, I decided that I could just "break" help a little.  This fix isn't as drastic as EKM's fix since Help Viewer can still run this way.  It also doesn't involve any 3rd party apps like the MoreInternet pane.</p>

<p>The responsible AppleScript has been named as <b>/Library/Documentation/Help/MacHelp.help/Contents/Resources/English.lproj/shrd/OpnApp.scpt</b><br />
so you can just navigate your way to the file manually or copy the following line into the field that pops up when you type Shift-Command-G in the finder:<br />
<b>/Library/Documentation/Help/MacHelp.help/Contents/Resources/English.lproj/shrd/</b><br />
Then just rename the script "OpnApp.scpt" to "dontOpnApp.scpt".</p>

<p>What this does is keep the help viewer application from finding the script is uses for opening any other applications.  If you use help regularly, this will keep you from using the function "Open System Preferences for me" etc.  This won't effect any other possible protocol problems like <a href="telnet://towel.blinkenlights.nl" rel="nofollow">telnet://starwars</a> or ssh:// or <a href="file:///usr/bin" rel="nofollow">file:///</a> though.</p>

<p>Thanks for pointing this out.  I consider myself a mac guru and had no knowledge of this exploit.  I had heard about the QuickTime hole though.</p>]]>
	 &lt;p&gt;Posted May 21, 2004  7:54 PM by Ben Zvan&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49101</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49101</guid>
         <pubDate>Fri, 21 May 2004 19:54:11 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #61 from DV Girl</title>
         <description>comment from DV Girl on 21.May.04</description>
         <content:encoded><![CDATA[<p>I just got the software update pop-up on my Mac for Security Patch for 'HelpView and Terminal' as the listed features.  I assume this is the 'official' patch from Apple.</p>]]>
	 &lt;p&gt;Posted May 21, 2004  8:51 PM by DV Girl&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49106</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49106</guid>
         <pubDate>Fri, 21 May 2004 20:51:19 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #62 from Lisa Spangenberg</title>
         <description>comment from Lisa Spangenberg on 21.May.04</description>
         <content:encoded><![CDATA[<p>Yep; it's the official Apple update. If you're really worried, download it now via Software Update. If, like me, you tend to let others find the bugs, you might wait a couple of days to make sure the kinks really are worked out. And if you really are like me, you'll likely want to run Disk Utility's Verify Permissions/Repair permissions after the install, just 'cause.</p>]]>
	 &lt;p&gt;Posted May 21, 2004 10:42 PM by Lisa Spangenberg&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49114</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49114</guid>
         <pubDate>Fri, 21 May 2004 22:42:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #63 from Just Helping</title>
         <description>comment from Just Helping on 22.May.04</description>
         <content:encoded><![CDATA[<p>the iCab browser (www.icab.de; currently free "preview" version<br />
but widely used) has a Preferences > Security setting "Launch Programs by HTML Links" which has settings choices like "Always Ask", "Always Permit", "Never Permit", etc.  I haven't tried setting that to "Always Permit" to find out, but it sounds like that might solve the problem if set to "Never" or "Ask"?  In general, iCab has pretty thorough preferences settings available.</p>]]>
	 &lt;p&gt;Posted May 22, 2004  2:33 PM by Just Helping&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49178</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49178</guid>
         <pubDate>Sat, 22 May 2004 14:33:02 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #64 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 22.May.04</description>
         <content:encoded><![CDATA[<p>I've just downloaded the same Security Update. Kudos to all those who pointed it out, not only for providing fixes and so forth, but also for forcing Apple to finally address the problem! </p>

<p>Of course, this raises the question: does the update really fix the problem? Or do we still need the prescribed fixes? Inquiring minds want to know...</p>]]>
	 &lt;p&gt;Posted May 22, 2004  9:54 PM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49209</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49209</guid>
         <pubDate>Sat, 22 May 2004 21:54:31 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #65 from Dan Hoey</title>
         <description>comment from Dan Hoey on 24.May.04</description>
         <content:encoded><![CDATA[<p>Rachel Reiss: <i>Of course, this raises the question: does the update really fix the problem? Or do we still need the prescribed fixes?</i><p>The update does not fix the problem.  See, for example, <a href="http://secunia.com/advisories/11689/" rel="nofollow">secunia.com</a>'s advisory:<blockquote>This vulnerability has been confirmed on a fully patched Mac OS X system (including the patch "Security Update 2004-05-24 for Mac OS X" released by Apple, which fixes the "help" URI handler vulnerability).</blockquote></p><p>There's more at <a href="http://www.euronet.nl/~tekelenb/playground/security/URLschemes/" rel="nofollow">Sander Tekelenburg</a>'s site.  Apple is still losing ground on this one.</p><br />
</p>]]>
	 &lt;p&gt;Posted May 24, 2004 11:51 AM by Dan Hoey&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49336</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49336</guid>
         <pubDate>Mon, 24 May 2004 11:51:05 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #66 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 25.May.04</description>
         <content:encoded><![CDATA[<p>Dan: Thanks for that last link--I followed the advice there and downloaded Paranoid Android on the "every little bit helps" theory. Hope I've finally got a safe system, but of course there's no such thing, really.</p>]]>
	 &lt;p&gt;Posted May 25, 2004  9:29 AM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49397</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49397</guid>
         <pubDate>Tue, 25 May 2004 09:29:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #67 from Patrick Nielsen Hayden</title>
         <description>comment from Patrick Nielsen Hayden on 25.May.04</description>
         <content:encoded><![CDATA[<p>John Gruber sums up the current state of play with admirable clarity <a href="http://daringfireball.net/2004/05/ounce_of_prevention" rel="nofollow">here</a>.</p>

<p>Short version: </p>

<p>Download and install Apple's patch.</p>

<p>Turn off Safari’s "Open 'safe files after downloading" preference.</p>

<p>Get <a href="http://www.rubicode.com/Software/RCDefaultApp/" rel="nofollow">RCDefaultApp</a>.  (If you already installed More Internet, get rid of it.)  Use it to set the following protocols to "disabled":</p>

<p>afp:<br />
disk:<br />
disks:<br />
telnet:</p>

<p>Finally, either disable "ftp:" or set it to a real FTP program, i.e., <em>not</em> the default setting of the Finder.</p>

<p>You do <em>not</em> need Paranoid Android if you do all of that; and, in general, "haxies" are well to avoid if you don't need them.</p>]]>
	 &lt;p&gt;Posted May 25, 2004  3:14 PM by Patrick Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49424</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49424</guid>
         <pubDate>Tue, 25 May 2004 15:14:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #68 from Dan Hoey</title>
         <description>comment from Dan Hoey on 25.May.04</description>
         <content:encoded><![CDATA[<p>Patrick: ...<i>Get RCDefaultApp. (If you already installed More Internet, get rid of it.) Use it to set the following protocols to "disabled"...</i><p>I'm still missing why you advise RCDefaultApp over More Internet, or either of them over Internet Explorer.  I used IE to set the handler for those URIs to a safe application, and the tests John Gruber points to run that application.</p><p>I think IE is still included in MacOS, isn't it?  I'm no fan of IE, but when it's already there, and it seems to do the trick, why download a new tool?</p></p>]]>
	 &lt;p&gt;Posted May 25, 2004  4:15 PM by Dan Hoey&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49430</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49430</guid>
         <pubDate>Tue, 25 May 2004 16:15:35 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #69 from Patrick Nielsen Hayden</title>
         <description>comment from Patrick Nielsen Hayden on 25.May.04</description>
         <content:encoded><![CDATA[<p>I said I was summarizing Gruber; for further explanations, read his actual posts.  (He's a good  explainer, generally worth reading anyway.)</p>

<p>Regarding More Internet or MSIE, as I understand it, either of those is probably OK.  The advantage of RCDefaultApp is that you can simply <em>disable </em> a protocol, rather than setting it to some silly alternate app.  Clearer and more elegant, to some values of elegant.</p>

<p>(Of course, by "disable", we mean disconnect the protocol from LaunchServices, I believe.  AFP, disk images, telnet, etc., will all still work fine; they just won't fire up as the result of the user clicking J. Random URL.)</p>

<p>It's a fine point.  If you prefer to use "More Internet" or the settings buried in MSIE you'll undoubtably be secure.</p>]]>
	 &lt;p&gt;Posted May 25, 2004  4:51 PM by Patrick Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49435</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49435</guid>
         <pubDate>Tue, 25 May 2004 16:51:24 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #70 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 25.May.04</description>
         <content:encoded><![CDATA[<p>Thanks, Patrick. I followed your instructions--admirably clear and lucid (and yes, I prefer "disabled" to launching a game!), by the way--except that I couldn't disable "disks:" in URL, because it doesn't seem to exist. </p>

<p>(where does one get a real FTP programs, she wonders. quietly to herself.)</p>

<p>I have a headache, but I think I feel safer. (But there's always something...I'm not really paranoid, it's just that they are all out to get me.)</p>]]>
	 &lt;p&gt;Posted May 25, 2004  4:58 PM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49437</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49437</guid>
         <pubDate>Tue, 25 May 2004 16:58:22 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #71 from Patrick Nielsen Hayden</title>
         <description>comment from Patrick Nielsen Hayden on 25.May.04</description>
         <content:encoded><![CDATA[<p>There are lots of FTP programs available for OS X.  I personally like the old command-line stalwart <a href="http://www.ncftpd.com/" rel="nofollow">ncftp</a>, but if you want a nice front end, <a href="http://rsug.itd.umich.edu/software/fugu/" rel="nofollow">Fugu</a> is open-source and supports secure ftp, scp, and ssh.</p>

<p>Are you saying the "disks" protocol wasn't listed in the URL tab of RCDefaultApp?  Are you using Jaguar or Panther?</p>

<p>(For extra entertainment, imagine the above two paragraphs being read aloud at the 1956 Worldcon banquet.)</p>]]>
	 &lt;p&gt;Posted May 25, 2004  5:05 PM by Patrick Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49438</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49438</guid>
         <pubDate>Tue, 25 May 2004 17:05:19 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #72 from Dan Hoey</title>
         <description>comment from Dan Hoey on 25.May.04</description>
         <content:encoded><![CDATA[<p>Patrick, I actually did read John Gruber's page, and didn't get the difference between RCDefaultApp and the other solutions.  But he answered his e-mail, and by reading words of few syllables I finally got it.</p><p>The actual database we have to edit is called "Launch Services", but MSIE, MoreInternet, and MisFox edit a compatibility database called "Internet Config".  When you set a URI handler in IC, it writes through to LS, so the vulnerability is patched.  But from the IC level you don't see those URIs that have been registered in LS but not IC.  That's why you have to <i>create</i> a disks: URI if you're using an IC-based tool.</p>]]>
	 &lt;p&gt;Posted May 25, 2004  6:23 PM by Dan Hoey&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49442</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49442</guid>
         <pubDate>Tue, 25 May 2004 18:23:44 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #73 from Rachel Reiss</title>
         <description>comment from Rachel Reiss on 25.May.04</description>
         <content:encoded><![CDATA[<p>Thank you for the pointer (not to mention all the help--which of course I just mentioned, so just pretend I didn't)--I'll give Fugu a look-see.</p>

<p>And yes (she said confusingly), the "disks" protocol wasn't listed in the URL tab of RCDefaultApp, only "disk". Which I disabled. And I'm running 10.2.8--maybe it doesn't exist yet? ...and now it sounds like I'm time traveling, which would be even more appropriate (read aloud etc.)</p>]]>
	 &lt;p&gt;Posted May 25, 2004  6:28 PM by Rachel Reiss&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49443</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49443</guid>
         <pubDate>Tue, 25 May 2004 18:28:12 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #74 from David Goldfarb</title>
         <description>comment from David Goldfarb on 26.May.04</description>
         <content:encoded><![CDATA[<p>So how do I get rid of MoreInternet?  It's...less than obvious.</p>]]>
	 &lt;p&gt;Posted May 26, 2004 12:14 AM by David Goldfarb&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49475</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49475</guid>
         <pubDate>Wed, 26 May 2004 00:14:01 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #75 from Patrick Nielsen Hayden</title>
         <description>comment from Patrick Nielsen Hayden on 26.May.04</description>
         <content:encoded><![CDATA[<p>Depending on whether you installed it for "all users on this machine" or just yourself, it's either in /Library/PreferencePanes/, or ~/Library/PreferencePanes/ -- i.e., either the system library or your user library.</p>

<p>To uninstall, drag the file to the trash.  You won't be able to empty the trash until you restart (or at least re-login), but don't worry about it.</p>]]>
	 &lt;p&gt;Posted May 26, 2004 12:20 AM by Patrick Nielsen Hayden&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49476</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49476</guid>
         <pubDate>Wed, 26 May 2004 00:20:16 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #76 from David Goldfarb</title>
         <description>comment from David Goldfarb on 26.May.04</description>
         <content:encoded><![CDATA[<p>Thanks.  Actually, I was able to empty the trash with the preference pane in....</p>]]>
	 &lt;p&gt;Posted May 26, 2004  3:43 AM by David Goldfarb&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#49490</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#49490</guid>
         <pubDate>Wed, 26 May 2004 03:43:08 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #77 from Marina</title>
         <description>comment from Marina on 17.Aug.04</description>
         <content:encoded><![CDATA[<p>I wonder if I have a normal blog site structure..I would appreciate your coming to my blog and leaving some "fresh" ideas and proposals concerning what it is better to rebuild or reorganize.<br />
I need your help and support. Thanks. </p>]]>
	 &lt;p&gt;Posted August 17, 2004 10:26 AM by Marina&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#55353</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#55353</guid>
         <pubDate>Tue, 17 Aug 2004 10:26:38 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #78 from Tom Whitmore wonders whether this is comment spam</title>
         <description>comment from Tom Whitmore wonders whether this is comment spam on 17.Aug.04</description>
         <content:encoded><![CDATA[<p>Haven't checked, but this msg sure looks like it might be!</p>]]>
	 &lt;p&gt;Posted August 17, 2004 10:59 AM by Tom Whitmore wonders whether this is comment spam&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#55355</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#55355</guid>
         <pubDate>Tue, 17 Aug 2004 10:59:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Bleeping huge security hole -- comment #79 from Andy Perrin (thinks it&apos;s not CS)</title>
         <description>comment from Andy Perrin (thinks it's not CS) on 17.Aug.04</description>
         <content:encoded><![CDATA[<p>There's a real blog on the other end. I think it's just a poster in need of gorm.</p>]]>
	 &lt;p&gt;Posted August 17, 2004 11:03 AM by Andy Perrin (thinks it&apos;s not CS)&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/005217.html#55356</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/005217.html#55356</guid>
         <pubDate>Tue, 17 Aug 2004 11:03:59 -0500</pubDate>
      </item>
      
   </channel>
</rss>