---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Apple AirPort Base Station Network Access Restriction Bypass SECUNIA ADVISORY ID: SA39160 VERIFY ADVISORY: http://secunia.com/advisories/39160/ DESCRIPTION: A security issue has been reported in Apple AirPort Base Station, which can be exploited by malicious people to bypass certain security restrictions. The problem is caused due to MAC address ACLs not being properly propagated to network extenders, which may result in restricted networks being accessible. SOLUTION: Apply AirPort Base Station Update 2010-001. AirPort Utility 5.5.1 for Windows: http://support.apple.com/kb/DL954 AirPort Utility 5.5.1 for Mac: http://support.apple.com/kb/DL955 PROVIDED AND/OR DISCOVERED BY: The vendor credits Guido Lamberty. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT3958 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------