----------------------------------------------------------------------


  Secunia CSI
+ Microsoft SCCM
-----------------------
= Extensive Patch Management

http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/


----------------------------------------------------------------------

TITLE:
Apple AirPort Base Station Network Access Restriction Bypass

SECUNIA ADVISORY ID:
SA39160

VERIFY ADVISORY:
http://secunia.com/advisories/39160/

DESCRIPTION:
A security issue has been reported in Apple AirPort Base Station,
which can be exploited by malicious people to bypass certain security
restrictions.

The problem is caused due to MAC address ACLs not being properly
propagated to network extenders, which may result in restricted
networks being accessible.

SOLUTION:
Apply AirPort Base Station Update 2010-001.

AirPort Utility 5.5.1 for Windows:
http://support.apple.com/kb/DL954

AirPort Utility 5.5.1 for Mac:
http://support.apple.com/kb/DL955

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Guido Lamberty.

ORIGINAL ADVISORY:
Apple:
http://support.apple.com/kb/HT3958

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------