Mailing Lists: Apple Mailing Lists
Image of Mac OS face in stamp
APPLE-SA-2008-09-24 Java for Mac OS X 10.5 Update 2
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

APPLE-SA-2008-09-24 Java for Mac OS X 10.5 Update 2



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2008-09-24 Java for Mac OS X 10.5 Update 2

Java for Mac OS X 10.5 Update 2 is now available and addresses the
following issues:

Java
CVE-ID:  CVE-2008-3638
Available for:  Mac OS X v10.5.4 and later,
Mac OS X Server v10.5.4 and later
Impact:  Visiting a maliciously crafted website may lead to arbitrary
code execution
Description:  The Java plug-in does not block applets from launching
file:// URLs. Visiting a website containing a maliciously crafted
Java applet may allow a remote attacker to launch local files, which
may lead to arbitrary code execution. This update addresses the issue
through improved handling of URLs. This is an Apple-specific issue.
Credit to Nitesh Dhanjani and Billy Rios for reporting this issue.

Java
CVE-ID:  CVE-2008-3637
Available for:  Mac OS X v10.5.4 and later,
Mac OS X Server v10.5.4 and later
Impact:  Visiting a maliciously crafted website may lead to arbitrary
code execution
Description:  An error checking issue leading to the use of an
uninitialized variable exists in the Hash-based Message
Authentication Code (HMAC) provider used for generating MD5 and SHA-1
hashes. Visiting a website containing a maliciously crafted Java
applet may lead to arbitrary code execution. This update addresses
the issue through improved error handling. This is an Apple-specific
issue. Credit to Radim Marek for reporting this issue.

Java
CVE-ID:  CVE-2008-1185, CVE-2008-1186, CVE-2008-1187, CVE-2008-1188,
CVE-2008-1189, CVE-2008-1190, CVE-2008-1191, CVE-2008-1192,
CVE-2008-1195, CVE-2008-1196, CVE-2008-3104, CVE-2008-3107,
CVE-2008-3108, CVE-2008-3111, CVE-2008-3112, CVE-2008-3113,
CVE-2008-3114
Available for:  Mac OS X v10.5.4 and later,
Mac OS X Server v10.5.4 and later
Impact:  Multiple vulnerabilities in Java 1.4.2_16
Description:  Multiple vulnerabilities exist in Java 1.4.2_16, the
most serious of which may allow untrusted Java applets to obtain
elevated privileges. Visiting a web page containing a maliciously
crafted Java applet may lead to arbitrary code execution. These
issues are addressed by updating Java 1.4 to version 1.4.2_18.
Further information is available via the Sun Java website at
http://java.sun.com/j2se/1.4.2/ReleaseNotes.html

Java
CVE-ID:  CVE-2008-1185, CVE-2008-1186, CVE-2008-1187, CVE-2008-1188,
CVE-2008-1189, CVE-2008-1190, CVE-2008-1191, CVE-2008-1192,
CVE-2008-1193, CVE-2008-1194, CVE-2008-1195, CVE-2008-1196,
CVE-2008-3103, CVE-2008-3104, CVE-2008-3107, CVE-2008-3111,
CVE-2008-3112, CVE-2008-3113, CVE-2008-3114, CVE-2008-3115
Available for:  Mac OS X v10.5.4 and later,
Mac OS X Server v10.5.4 and later
Impact:  Multiple vulnerabilities exist in Java 1.5.0_13
Description:  Multiple vulnerabilities in Java 1.5.0_13, the most
serious of which may allow untrusted Java applets to obtain elevated
privileges. Visiting a web page containing a maliciously crafted Java
applet may lead to arbitrary code execution. These issues are
addressed by updating Java 1.5 to version 1.5.0_16. Further
information is available via the Sun Java website at
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html

Java
CVE-ID:  CVE-2008-3103, CVE-2008-3104, CVE-2008-3105, CVE-2008-3106,
CVE-2008-3107, CVE-2008-3109, CVE-2008-3110, CVE-2008-3111,
CVE-2008-3112, CVE-2008-3113, CVE-2008-3114, CVE-2008-3115
Available for:  Mac OS X v10.5.4 and later,
Mac OS X Server v10.5.4 and later
Impact:  Multiple vulnerabilities in Java 1.6.0_05
Description:  Multiple vulnerabilities exist in Java 1.6.0_05, the
most serious of which may allow untrusted Java applets to obtain
elevated privileges. Visiting a web page containing a maliciously
crafted Java applet may lead to arbitrary code execution. These
issues are addressed by updating Java 1.6 to version 1.6.0_07.
Further information is available via the Sun Java website at
http://java.sun.com/javase/6/webnotes/ReleaseNotes.html

Java
Available for:  Mac OS X v10.5.4 and later,
Mac OS X Server v10.5.4 and later
Impact:  Limited ability of applications to use stronger
cryptographic keys
Description:  The default jurisdiction policy distributed with Java
1.5 on Mac OS X v10.5 restricts the maximum strength of cryptographic
keys supported in Java Cryptography Extension (JCE) to 128 bits. This
update addresses the issue by changing the default jurisdiction
policy to the unlimited strength version. Credit to Bruno Harbulot of
the University of Manchester for reporting this issue.

Java for Mac OS X 10.5 Update 2 may be obtained from the Software
Update pane in System Preferences, or Apple's Software Downloads
web site: http://www.apple.com/support/downloads/

The download file is named:  "JavaForMacOSX10.5Update2.dmg"
Its SHA-1 digest is:  5b2a8de347fe68d0638bcf0ede8a71ba35adbab9

Information will also be posted to the Apple Security Updates
web site:  http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: 9.7.2.1608

wsBVAwUBSNqBp3kodeiKZIkBAQheFwf/b5Z99rzZmmMH5WgqMoTZiq/Vjr2GOUeF
kiE7hMpwDiiNSFCtVvRrWuBLr2Ng38JJ5V3jyZ9n7qq0hOzvzGyIYpeB6wQ28ukr
OyshyFwQ3S3PNW41HMDZ41bnUZkwnLIJmCV0VhF4cvy/i6uNGg9Nv56WwEPapot3
bD+21sGuVH9kaNy+7ebzH7RO3MNutALpUmg94+a6emGuYHLyUCmX96Rn3oj2iwy/
A6E5QD7GeSWpRROoFpDIPXSzw7eD7PZnotQj/xEByZLe/D/kDK4+o8Wbwx0wMD1L
Is/YmVYyzOKZIdzPwQ2k9aiGdWhuxut+o5cuo59EPTDX7SRrR7CxYw==
=BVNb
-----END PGP SIGNATURE-----

_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden




Visit the Apple Store online or at retail locations.
1-800-MY-APPLE

Contact Apple | Terms of Use | Privacy Policy

Copyright © 2011 Apple Inc. All rights reserved.