According to nCircle's Andrew Storms, the client libraries on a fully patched OSX 10.4.11 system still does not implement source port randomization, which is the recommended to help improve resilience against DNS cache poisoning attacks.
Storms provided a comparison between a patched FreeBSD 6.3 system and a patched OSX 10.4.11 system:
FreeBSD 6.3
OSX 10.4.11
This clearly shows no source port randomization happening on OS X 10.4.11.
For Apple, it matters most that they patch the client libraries since there are so few OSX recursive servers in use. The bottom line is that despite this update, it appears that the client libraries still aren't patched.
Apple does not respond to media queries about security issues.
ALSO SEE:
* Microsoft joins ‘patch DNS now’ chant; Apple patch missing
* Vulnerability disclosure gone awry: Understanding the DNS debacle