Apple Releases Firmware Update for AirPort
Users of Apple’s AirPort base station should make a point to install the recently released firmware update. The update, Firmware Version 7.6.7 and 7.7.7, corrects a vulnerability with DNS data parsing that resulted in memory corruption. The vulnerability could also have allowed for arbitrary code execution. So far, there have been no reports about anyone exploiting this particular vulnerability. However, just to be safe, AirPort users should install the firmware update as soon as possible.
DNS data parsing is a key feature of wireless routers. DNS stands for domain name system, so “DNS data parsing” refers to the process of a web domain and a router exchanging IP address information. Apple didn’t provide much detail about precisely how a hacker could have exploited the data parsing issue to gain control of a user’s system. However, since IP addresses were involved, it’s safe to say that the threat was relatively severe.
In addition to closing the code execution vulnerability, Apple says the new firmware update fixed a problem with communication between clients on the same network, adds an extended guest network, and “addresses potential naming conflicts with Bonjour Sleep Proxy.”
You should use Firmware Version 7.6.7 if you have an 802.11n AirPort base station, and 7.7.7 if you have an 802.11ac AirPort base station. To learn more about the updates or to find information about how to update your AirPort firmware, visit Apple’s support page.