Mailing Lists: Apple Mailing Lists
Image of Mac OS face in stamp
APPLE-SA-2009-09-03-1 Java for Mac OS X 10.5 Update 5
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

APPLE-SA-2009-09-03-1 Java for Mac OS X 10.5 Update 5



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2009-09-03-1 Java for Mac OS X 10.5 Update 5

Java for Mac OS X 10.5 Update 5 is now available and addresses the
following:

Java
CVE-ID:  2009-2475, 2009-2476, 2009-2670, 2009-2690, 2009-0217,
2009-2671, 2009-2672, 2009-2673, 2009-2674, 2009-2689, 2009-2675,
2009-2625
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact:  Multiple vulnerabilities in Java 1.6.0_13
Description:  Multiple vulnerabilities exist in Java 1.6.0_13, the
most serious of which may allow an untrusted Java applet to obtain
elevated privileges. Visiting a web page containing a maliciously
crafted untrusted Java applet may lead to arbitrary code execution
with the privileges of the current user. These issues are addressed
by updating to Java version 1.6.0_15. Further information is
available via the Sun Java website at
http://java.sun.com/javase/6/webnotes/ReleaseNotes.html

Java
CVE-ID:  2009-2722, 2009-2723, 2009-2475, 2009-2670, 2009-2690,
2009-2671, 2009-2672, 2009-2673, 2009-2689, 2009-2675, 2009-2625
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact:  Multiple vulnerabilities in Java 1.5.0_19
Description:  Multiple vulnerabilities exist in Java 1.5.0_19, the
most serious of which may allow an untrusted Java applet to obtain
elevated privileges. Visiting a web page containing a maliciously
crafted untrusted Java applet may lead to arbitrary code execution
with the privileges of the current user. These issues are addressed
by updating to Java version 1.5.0_20. Further information is
available via the Sun Java website at
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html

Java
CVE-ID:  2009-2475, 2009-2689
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact:  Multiple vulnerabilities in Java 1.4.2_21
Description:  Multiple vulnerabilities exist in Java 1.4.2_21, the
most serious of which may allow an untrusted Java applet to obtain
elevated privileges. Visiting a web page containing a maliciously
crafted untrusted Java applet may lead to arbitrary code execution
with the privileges of the current user. These issues are addressed
by updating to Java version 1.4.2_22. Further information is
available via the Sun Java website at
http://java.sun.com/j2se/1.4.2/ReleaseNotes.html

Java
CVE-ID:  CVE-2009-2205
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact:  Launching a maliciously crafted Java Web Start application
may lead to an unexpected application termination or arbitrary code
execution
Description:  A stack buffer overflow exists in Java Web Start
command launcher. Launching a maliciously crafted Java Web Start
application may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue through
improved bounds checking. Credit to Chris Ries of Carnegie Mellon
University Computing Services for reporting this issue.


Java for Mac OS X 10.5 Update 5 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/

The download file is named: JavaForMacOSX10.5Update5.dmg
Its SHA-1 digest is: 20dd590192fb81a8f164b73727295ed2ac4f1693

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)

iQEcBAEBAgAGBQJKn/HOAAoJEHkodeiKZIkBXIQIAK7MoTqyqXjCNJv8GgYRP6xY
yEMXIS7kUkk372gAuovnc+t8KfpXVRLO0gsvLzi5GeYLKthjywCNfon8uTNg+Ba0
I+s5PxmyHw9H/B9IzLdA2X+qDhdS5UdYniMIgC69KO2XanBXZK/z5k4YkOJSyGNn
FWZ2iQf+sMhQvwHnFPof1kUdzKteqy8Jb1vFzpZiItFyxGJICco+kKqtNcJXHrqd
eBZuCko/6VDMNluJHLHbT7gsJBv1j8tBlDqoio7rD0p5+9vWYTzh48DiMz8ON/x/
UJd4FE3LjQuxLDqP0UW8ufm6zx62XnTd1m3YkTwPIfh6Iag8HBbvXSN5xCaT24E=
=WDaC
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden




Visit the Apple Store online or at retail locations.
1-800-MY-APPLE

Contact Apple | Terms of Use | Privacy Policy

Copyright © 2011 Apple Inc. All rights reserved.