More than three months after it last updated Mac OS X, Apple released 10.5.3, an upgrade for its Leopard operating system that boasts nearly 70 stability, compatibility and security improvements and fixes.
Apple did not include patches for several iCal vulnerabilities in the update, however.
Mac OS X 10.5.3, the third upgrade to Leopard since Apple launched it back in October 2007, addresses issues in several components and bundled applications, ranging from the Address Book and Automator to Time Machine and VoiceOver.
Apple also listed a baker's dozen under a "General" category that included a fix for hard drives that wouldn't show in the Finder; an improvement in Spotlight, the OS's built-in search tool, for searches done on AFP volumes; and a patch for stuttering audio and video playback from certain USB-based hardware.
AirPort, Apple's label for its wireless technology, got a pair of fixes: one to improve wireless reliability in general, the other to boost reliability when used with the company's relatively new Time Capsule router-cum-backup-device that debuted earlier this year.
iChat, the Mac OS's bundled instant messaging and video conferencing application, received five fixes; Mail, Apple's own email client, got 10; and Time Machine was the target of seven.
The Time Machine fixes, said Apple, resolve issues when backing up a notebook running on battery power, and address a reliability problem some users have encountered when restoring from a Time Machine backup.
Apple also tucked eight fixes for iCal, its personal scheduling program, into the 10.5.3 update, but did not patch the three security vulnerabilities disclosed a week ago by Core Security Technologies.
The three iCal bugs, which were reported to Apple in January 2008, were revealed last Wednesday by Core after it had repeatedly been asked by Apple to delay publishing its findings. Core decided to unveil the vulnerabilities after Apple again postponed its patches.
"No vendor moves as fast as the vulnerability researcher wants them to," said Andrew Storms, director of security operations at nCircle Network Security.
Storms refused to blame either side. "It generally takes a major vendor, like Microsoft or Apple, about six to eight months to get a patch released," he said. "But Core had every right to push the vendor into delivering the patch."
In a follow-on interview last week, Ivan Arce, Core Technologies' chief technology officer, said that the current version of iCal is vulnerable to the flaws, one of which he considered critical. But his team had not found evidence of any in-the-wild attacks trying to trigger the iCal vulnerabilities.
"It wouldn't take a whole lot of reverse engineering to figure this out," Storms said, referring to the ease with which attackers would be able to put two and two together from Core's disclosures. "It's a valid concern," he added. "The moment you click on a malformed .ics file, you're done."
Apple has not responded to emails asking when it would patch the iCal vulnerabilities.
Mac OS X 10.5.3 can be downloaded manually from the Apple site, or retrieved and installed using Mac OS X's integrated update feature.