Security-announce
Threads by month
- ----- 2025 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
March 2007
- 1 participants
- 4 discussions
site_archiver(a)lists.apple.com
Delivered-To: security-announce(a)lists.apple.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2007-03-13 iPhoto 6.0.6
iPhoto 6.0.6 is now available and fixes the following security issue:
CVE-ID: CVE-2007-0051
Available for: Mac OS X version 10.3.9, and Mac OS X version
10.4.3 or later
Impact: Subscribing to a maliciously-crafted photocast may lead
to arbitrary code execution
Description: A format string vulnerability exists in iPhoto. By
enticing a user to subscribe to a maliciously-crafted photocast,
a remote attacker can trigger the vulnerability which may lead
to arbitrary code execution. This has been described on the
Month of Apple Bugs web site (MOAB-04-01-2007). This update
addresses the issue by performing additional validation while
handling photocast subscriptions. Credit to Kevin Finisterre of
DigitalMunition for reporting this issue.
iPhoto 6.0.6 may be obtained from the Software Update pane in
System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
The download file is named: "iPhoto_606.dmg"
Its SHA-1 digest is: 18cb8a943cc65b56299dbea38eeb5b8434bff0ab
Information will also be posted to the Apple Product Security
web site:
http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)
iQEVAwUBRfbjT4mzP5/bU5rtAQiMQwf/UqE+sU3Nx7pPq2m/NXgWA6nXvuF+7Xl4
rl8ziXornSXjaPxEW3P1Ri2u1tY2/6J2mcC5E+c6IaI771CAfvAH2SsHrD2Q394/
FnLWP0vEI1nn8PmcBbWRZWeWKwHZJAJ6Xau9l0rpw/ULYTKWsJQEEhhcj4rhWFqR
LMintNsezjH/bNyBVCetVQxQQajZIF2KKqqWJUefZuwlq/g3vpx6njIwFqu3CLin
+MiXG5uDNtwm2yK9Jku1AxNk3xcl75gbHbZ2qSPh8sMTvAzqZrT2auREvkAR8OyA
sfMUz3EjubFO0uxbxc973P3EURiGocbBx9IUJF9pu+7bh0YkFG75Pw==
=Mv/S
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce(a)lists.apple.com)
Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/security-announce/site_archiver%40li…
This email sent to site_archiver(a)lists.apple.com
1
0
APPLE-SA-2007-03-13 Mac OS X v10.4.9 and Security Update 2007-003
by Apple Product Security 13 Mar '07
by Apple Product Security 13 Mar '07
13 Mar '07
site_archiver(a)lists.apple.com
Delivered-To: security-announce(a)lists.apple.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2007-03-13 Mac OS X v10.4.9 and Security Update 2007-003
Mac OS X v10.4.9 and Security Update 2007-003 are now available and
provide fixes for the following security issues. Mac OS X v10.4.9
also provides additional functionality changes, and information is
available in its release note.
The Software Update utility will present the update that applies
to your system configuration. Only one is needed, either
Mac OS X v10.4.9 or Security Update 2007-003.
ColorSync
CVE-ID: CVE-2007-0719
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Viewing a maliciously-crafted image with an embedded
ColorSync profile may lead to an unexpected application
termination or arbitrary code execution
Description: A stack buffer overflow exists in the handling of
embedded ColorSync profiles. By enticing a user to open a
maliciously-crafted image, an attacker can trigger the overflow,
which may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue by
performing additional validation of ColorSync profiles. Credit
to Tom Ferris of Security-Protocols for reporting this issue.
CoreGraphics
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Viewing a malformed PDF Document may lead to an
application hang
Description: CoreGraphics has been updated to address the issue
described on the Month of Apple Bugs web site (MOAB-06-01-2007),
which may lead to an application hang.
Crash Reporter
CVE-ID: CVE-2007-0467
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Crash Reporter may allow a local admin user to obtain
system privileges
Description: Crash Reporter uses an admin-writable system
directory to store logs of processes that have been unexpectedly
terminated. A malicious process running as an admin can cause
these logs to be written to arbitrary files as root, which could
result in the execution of commands with elevated privileges.
This issue has been described on the Month of Apple Bugs web
site (MOAB-28-01-2007). This update addresses the issue by
performing additional validation prior to writing to log files.
CUPS
CVE-ID: CVE-2007-0720
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Remote attackers may cause a denial of service during
SSL negotiation
Description: A partially-negotiated SSL connection with the CUPS
service may prevent other requests from being served until the
connection is closed. This update addresses the issue by
implementing timeouts during SSL negotiation.
Disk Images
CVE-ID: CVE-2007-0721
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Mounting a maliciously-crafted disk image may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption vulnerability exists in
diskimages-helper. By enticing a user to open a maliciously-crafted
compressed disk image, an attacker could trigger this issue which
may lead to an unexpected application termination or arbitrary
code execution. This update addresses the issue by performing
additional validation of disk images.
Disk Images
CVE-ID: CVE-2007-0722
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Mounting a maliciously-crafted AppleSingleEncoding disk
image may lead to an unexpected application termination or
arbitrary code execution
Description: An integer overflow vulnerability exists in the
handler for AppleSingleEncoding disk images. By enticing a local
user to open a maliciously-crafted disk image, an attacker could
trigger the overflow which may lead to an unexpected application
termination or arbitrary code execution. This update addresses
the issue by performing additional validation of
AppleSingleEncoding disk images.
Disk Images
CVE-ID: CVE-2006-6061, CVE-2006-6062, CVE-2006-5679,
CVE-2007-0229, CVE-2007-0267, CVE-2007-0299
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4.8, Mac OS X Server v10.4.8
Impact: Downloading a maliciously-crafted disk image may lead to
an unexpected system shutdown or arbitrary code execution
Description: Several vulnerabilities exist in the processing of
disk images that may lead to an unexpected termination of system
operations or arbitrary code execution. These have been
described on the Month of Kernel Bugs and Month of Apple Bugs
web sites (MOKB-03-11-2006, MOKB-20-11-2006, MOKB-21-11-2006,
MOAB-10-01-2007, MOAB-11-01-2007 and MOAB-12-01-2007). Since a
disk image may be automatically mounted when visiting web sites,
this allows a malicious web site to cause a denial of service.
This update addresses the issue by performing additional
validation of downloaded disk images prior to mounting them.
DS Plug-Ins
CVE-ID: CVE-2007-0723
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Unprivileged LDAP users may be able to change the local
root password
Description: An implementation flaw in DirectoryService allows
an unprivileged LDAP user to change the local root password. The
authentication mechanism in DirectoryService has been fixed to
address this issue.
Flash Player
CVE-ID: CVE-2006-5330
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Playing maliciously-crafted Flash content could allow an
HTTP request splitting attack
Description: Adobe Flash Player is updated to version 9.0.28.0
to fix a potential vulnerability that could allow HTTP request
splitting attacks. This issue is described as APSB06-18 on the
Adobe web site at http://www.adobe.com/support/security/
GNU Tar
CVE-ID: CVE-2006-0300, CVE-2006-6097
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Multiple vulnerabilities in GNU Tar, the most serious of
which is arbitrary code execution
Description: GNU Tar is updated from version 1.14 to 1.16.1.
Further information is available via the GNU web site at
http://www.gnu.org/software/tar/
HFS
CVE-ID: CVE-2007-0318
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Removing a file from a maliciously-crafted mounted
filesystem may lead to a denial of service
Description: An HFS+ filesystem in a mounted disk image can be
constructed to trigger a kernel panic when attempting to remove
a file from a mounted filesystem. This has been described on the
Month of Apple Bugs web site (MOAB-13-11-2006). This update
addresses the issue by performing additional validation of the
HFS+ filesystem.
HID Family
CVE-ID: CVE-2007-0724
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Console keyboard events are exposed to other users on
the local system
Description: Insufficient controls in the IOKit HID interface
allow any logged in user to capture console keystrokes,
including passwords and other sensitive information. This update
addresses the issue by limiting HID device events to processes
belonging to the current console user. Credit to Andrew Garber
of University of Victoria, Alex Harper, and Michael Evans for
reporting this issue.
ImageIO
CVE-ID: CVE-2007-1071
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Viewing a maliciously-crafted GIF file may lead to an
unexpected application termination or arbitrary code execution
Description: An integer overflow vulnerability exists in the
process of handling GIF files. By enticing a user to open a
maliciously-crafted image, an attacker can trigger the overflow
which may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue by
performing additional validation of GIF files. This issue does
not affect systems prior to Mac OS X v10.4. Credit to Tom Ferris
of Security-Protocols for reporting this issue.
ImageIO
CVE-ID: CVE-2007-0733
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Viewing a maliciously-crafted RAW Image may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue exists in the process of
handling RAW images. By enticing a user to open a
maliciously-crafted image, an attacker can trigger the issue
which may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue by
performing additional validation of RAW images. This issue does
not affect systems prior to Mac OS X v10.4. Credit to Luke
Church of the Computer Laboratory, University of Cambridge, for
reporting this issue.
Kernel
CVE-ID: CVE-2006-5836
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Malicious local users may be able to cause a denial of
service
Description: Using the fpathconf() system call on certain file
types will result in a kernel panic. This has been described on
the Month of Kernel Bugs web site (MOKB-09-11-2006). This update
addresses the issue through improved handling for all kernel
defined file types. Credit to Ilja van Sprundel for reporting
this issue.
Kernel
CVE-ID: CVE-2006-6129
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Executing a maliciously-crafted Universal Mach-O
binary may lead to an unexpected termination of system
operations or arbitrary code execution with elevated privileges
Description: An integer overflow vulnerability exists in the
loading of Universal Mach-O binaries. This could allow a
malicious local user to cause a kernel panic or to obtain system
privileges. This has been described on the Month of Kernel Bugs
web site (MOKB-26-11-2006). This update addresses the issue by
performing additional validation of Universal binaries.
Kernel
CVE-ID: CVE-2006-6173
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Executing a maliciously-crafted program may lead to a
system hang
Description: The shared_region_make_private_np() system call
allows a program to request a large allocation of kernel memory.
This could allow a malicious local user to cause a system hang.
This issue does not allow an integer overflow to occur, and it
cannot lead to arbitrary code execution. This issue has been
described on the Month of Kernel Bugs web site
(MOKB-28-11-2006). This update addresses the issue by additional
validation of the arguments passed to
shared_region_make_private_np().
MySQL Server
CVE-ID: CVE-2006-1516, CVE-2006-1517, CVE-2006-2753,
CVE-2006-3081, CVE-2006-4031, CVE-2006-4226, CVE-2006-3469
Available for: Mac OS X Server v10.4 through Mac OS X Server
v10.4.8
Impact: Multiple vulnerabilities in MySQL, the most serious of
which is arbitrary code execution
Description: MySQL is updated from version 4.1.13 to 4.1.22.
Further information is available via the MySQL web site at
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-x.html
Networking
CVE-ID: CVE-2006-6130
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Malicious local users may be able to cause an unexpected
termination of system operations or execute arbitrary code with
elevated privileges
Description: A memory corruption issue exists in the AppleTalk
protocol handler. This could allow a malicious local user to
cause a kernel panic or gain system privileges. This has been
described on the Month of Kernel Bugs web site
(MOKB-27-11-2006). This update addresses the issue by performing
additional validation of the input data structures.
Networking
CVE-ID: CVE-2007-0236
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Maliciously-crafted AppleTalk requests may lead to a
local denial of service or arbitrary code execution
Description: A heap buffer overflow vulnerability exists in the
AppleTalk protocol handler. By sending a maliciously-crafted
request, a local user can trigger the overflow which may lead to
a denial of service or arbitrary code execution. This has been
described on the Month of Apple Bugs web site (MOAB-14-01-2007).
This update addresses the issue by performing additional
validation of the input data.
OpenSSH
CVE-ID: CVE-2007-0726
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: A remote attacker can destroy established trust between
SSH hosts by causing SSH Keys to be regenerated
Description: SSH keys are created on a server when the first SSH
connection is established. An attacker connecting to the server
before SSH has finished creating the keys could force the keys
then to be recreated. This could result in a denial of service
against processes that rely on a trust relationship with the
server. Systems that already have SSH enabled and have rebooted
at least once are not vulnerable to this issue. This issue is
addressed by improving the SSH key generation process. This
issue is specific to the Apple implementation of OpenSSH. Credit
to Jeff McCune of The Ohio State University for reporting this
issue.
OpenSSH
CVE-ID: CVE-2006-0225, CVE-2006-4924, CVE-2006-5051,
CVE-2006-5052
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Multiple vulnerabilities in OpenSSH, the most serious of
which is arbitrary code execution
Description: OpenSSH is updated to version 4.5. Further
information is available via the OpenSSH web site at http://
www.openssh.org/txt/release-4.5.
Printing
CVE-ID: CVE-2007-0728
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: An unprivileged local user can overwrite arbitrary files
with system privileges
Description: Insecure file operations may occur during the
initialization of a USB printer. An attacker may leverage this
issue to create or overwrite arbitrary files on the system. This
update addresses the issue by improving the printer
initialization process.
QuickDraw Manager
CVE-ID: CVE-2007-0588
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Opening a maliciously-crafted PICT image may lead to an
unexpected application termination or arbitrary code execution
Description: A heap buffer overflow vulnerability exists in
QuickDraw's PICT image processing. By enticing a user to open a
maliciously-crafted image, an attacker can trigger the overflow
which may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue by
performing additional validation of PICT files. Credit to Tom
Ferris of Security-Protocols and Mike Price of McAfee AVERT Labs
for reporting this issue.
QuickDraw Manager
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Opening a malformed PICT image may lead to an unexpected
application termination
Description: QuickDraw Manager has been updated to address the
issue described on the Month of Apple Bugs web site
(MOAB-23-01-2007), which may lead to an unexpected application
termination. This issue does not lead to arbitrary code
execution.
servermgrd
CVE-ID: CVE-2007-0730
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: Remote attackers may be able to access Server Manager
without valid credentials
Description: An issue in Server Manager's validation of
authentication credentials could allow a remote attacker to
alter the system configuration. This update addresses the issue
by additional validation of authentication credentials.
SMB File Server
CVE-ID: CVE-2007-0731
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: A user with write access to an SMB share may be able to
cause a denial of service or arbitrary code execution
Description: A stack buffer overflow vulnerability exists in an
Apple-specific Samba module. A file with an overly-long ACL
could trigger the overflow, which may lead to a denial of
service or arbitary code execution. This update addresses the
issue by performing additional validation of ACLs. This issue
does not affect systems prior to Mac OS X v10.4. Credit to
Cameron Kay of Massey University, New Zealand for reporting this
issue.
Software Update
CVE-ID: CVE-2007-0463
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, and
Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Opening a maliciously-crafted Software Update Catalog
file may lead to an unexpected application termination or
arbitrary code execution
Description: A format string vulnerability exists in the
Software Update application. By enticing a user to download and
open a Software Update Catalog file, an attacker can trigger the
vulnerability which may lead to an unexpected application
termination or arbitrary code execution. This has been described
on the Month of Apple Bugs web site (MOAB-24-01-2007). This
update addresses the issue by removing document bindings for
Software Update Catalogs. This issue does not affect systems
prior to Mac OS X v10.4. Credit to Kevin Finisterre of
DigitalMunition for reporting this issue.
sudo
CVE-ID: CVE-2005-2959
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9,
Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4
through Mac OS X Server v10.4.8
Impact: A local user with sudo access to a bash script can run
arbitrary commands with elevated privileges
Description: A user-modified sudo configuration could allow
environment variables to be passed through to the program
running as a privileged user. If sudo is configured to allow an
otherwise unprivileged user to execute a given bash script with
elevated privileges, the user may be able to execute arbitrary
code with elevated privileges. Systems with the default sudo
configuration are not vulnerable to this issue. This issue has
been addressed by updating sudo to 1.6.8p12. Further information
is available via the sudo web site at
http://www.sudo.ws/sudo/current.html
WebLog
CVE-ID: CVE-2006-4829
Available for: Mac OS X Server v10.4 through Mac OS X Server
v10.4.8
Impact: A remote attacker can conduct cross-site scripting
attacks through Blojsom
Description: A cross-site scripting vulnerability exists in
Blojsom. This allows remote attackers to inject JavaScript into
blog content that will execute in the domain of the Blojsom
server. This update addresses the issue by performing additional
validation of the user input. This issue does not affect systems
prior to Mac OS X v10.4.
Mac OS X v10.4.9 and Security Update 2007-003 may be obtained from
the Software Update pane in System Preferences, or Apple's Software
Downloads web site:
http://www.apple.com/support/downloads/
The Software Update utility will present the update that applies
to your system configuration. Only one is needed, either
Mac OS X v10.4.9 or Security Update 2007-003.
For Mac OS X v10.3.9
The download file is named: "SecUpd2007-003Pan.dmg"
Its SHA-1 digest is: 5b6cf9b8a9d0a9afc5d9196f2e54380e5dd6d9b6
For Mac OS X Server v10.3.9
The download file is named: "SecUpdSrvr2007-003Pan.dmg"
Its SHA-1 digest is: 89d57e9a5faa24e82a5991184468a611bc0bc0bc
For Mac OS X v10.4.8 (PowerPC)
The download file is named: "MacOSXUpd10.4.9PPC.dmg"
Its SHA-1 digest is: 380b0db5c8978a025cfc9b19e46845a51608d5be
For Mac OS X v10.4 (PowerPC) through v10.4.7 (PowerPC)
The download file is named: "MacOSXUpdCombo10.4.9PPC.dmg"
Its SHA-1 digest is: 32af8d8aacac4d696a339f3e11074f2f436c1772
For Mac OS X v10.4.8 (Intel)
The download file is named: "MacOSXUpd10.4.9Intel.dmg"
Its SHA-1 digest is: 80ce586b1f5640bd2fc191354013890b8f0c47dd
For Mac OS X v10.4.4 (Intel) through v10.4.7 (Intel)
The download file is named: "MacOSXUpdCombo10.4.9Intel.dmg"
Its SHA-1 digest is: 29c7a75a0ed2af9ed1f510e8a5c591c8dfeb9605
For Mac OS X Server v10.4.8 (PowerPC)
The download file is named: "MacOSXServerUpd10.4.9PPC.dmg"
Its SHA-1 digest is: 5c1ba866d515c476eae55a1dbfc7dd8226804bba
For Mac OS X Server v10.4 through v10.4.7 (PowerPC)
The download file is named: "MacOSXSrvrCombo10.4.9PPC.dmg"
Its SHA-1 digest is: 7b0df34abb43aace52e6298dbe2c3de24760745d
For Mac OS X Server v10.4.8 (Universal)
The download file is named: "MacOSXServerUpd10.4.9Univ.dmg"
Its SHA-1 digest is: 9c448563e8195f561ebac2f8d15ce4bf1c6d48f5
For Mac OS X Server v10.4.7 (Universal)
The download file is named: "MacOSXSrvrCombo10.4.9Univ.dmg"
Its SHA-1 digest is: 494e2949f101399a9691f138952f03331063bcf0
Information will also be posted to the Apple Security Updates
web site:
http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)
iQEVAwUBRfbjjYmzP5/bU5rtAQi9qgf/XCyQI4JuD16Y1+hw5jgbT4swr2xHLAcn
JsuCXCTZstXc2+9hQmOU8RX3lOgzSgNtif7OoVfkN2iqGqwYDl/hTQiTMicndazT
1OF97ke0WKm+8TY2uuYK7HxHrAWhPNXehq4anKHua/4b8jrho4yBEPgYp7jJxZ/T
pNk5LVIAcW7rUMrzjRTG440MiajGWZOUhoVP2U12QHmTYY+NsCUUWMod2RwobYkT
T74Y8f557bHD1fK8W4w2+YHSByfO6hPmIshSirbehAfqOpsvNmDMsUX05wP1Os1R
XPKwlkotQDTDjaccW8SUc6Wiz2nn/5zEd5fjJr4/YjqqhS6KWQpmAA==
=DZvH
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce(a)lists.apple.com)
Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/security-announce/site_archiver%40li…
This email sent to site_archiver(a)lists.apple.com
1
0
site_archiver(a)lists.apple.com
Delivered-To: security-announce(a)lists.apple.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2007-03-08 AirPort Extreme Update 2007-002
AirPort Extreme Update 2007-002 is now available. It contains the
content of AirPort Extreme Update 2007-001 plus an additional
non-security fix for a compatibility issue when using certain
third-party access points configured to use WEP. AirPort Extreme
Update 2007-001 contained a fix for the following security issue:
AirPort
CVE-ID: CVE-2006-6292
Available for: Mac OS X v10.4.8, Mac OS X Server v10.4.8
Impact: Attackers on the wireless network may cause system
crashes
Description: An out-of-bounds memory read may occur while
handling wireless frames. An attacker in local proximity may be
able to trigger a system crash by sending a maliciously-crafted
frame to an affected system. This issue affects the Core Duo
version of Mac mini, MacBook, and MacBook Pro computers equipped
with wireless. Other systems, including the Core 2 Duo versions
are not affected. This update addresses the issue by performing
additional validation of wireless frames. Credit to LMH for
reporting this issue.
Systems which installed AirPort Extreme Update 2007-001 are correctly
patched for CVE-2006-6292. Installing AirPort Extreme Update
2007-002 is recommended to obtain the compatibility fix. Affected
systems that have not yet applied AirPort Extreme Update 2007-001
should apply AirPort Extreme Update 2007-002.
AirPort Extreme Update 2007-002 may be obtained from the Software
Update pane in System Preferences, or Apple's Software Downloads web
site: http://www.apple.com/support/downloads/
The download file is named: "AirPortExtremeUpdate2007002.dmg"
Its SHA-1 digest is: ba20b5807dd99308ca2431c2e9a2b4e1b93bcbd1
Information will also be posted to the Apple Security Updates
web site:
http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.3 (Build 2932)
iQEVAwUBRfCzl4mzP5/bU5rtAQibHQgAmPz1cdUTmzyYUlcIEipvyJDoveNBAxet
ku8rgN1kpBA2/YqcQYBZIDqMlr2aW2OBQOP+M6x18MgY0Cfyt9MNKQHph//2WWf8
fEnAdI7J04FsEhz3XnvdaudU9mJQTqTGxbH5ITZ9HaHuwSwNbbfsEdmaPzMEjTuW
gb15us+iDmjTt6G74ZtEbt8lTQe6qaTlncPbGx5vxpCnHSP/T73j7AzOn4Pg0mYl
6qnTXFI/NT2HCnzTdqkthyM40LhDsNoxQufWUi7eqq17kly5/o9owPSI0TTUaOHi
yRNjIct6ztKjMxb5Xywzp5sWh+r0i/xvFKp2223nYAIXjIQJvY6GKA==
=4/xe
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce(a)lists.apple.com)
Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/security-announce/site_archiver%40li…
This email sent to site_archiver(a)lists.apple.com
1
0
site_archiver(a)lists.apple.com
Delivered-To: security-announce(a)lists.apple.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2007-03-05 QuickTime 7.1.5
QuickTime 7.1.5 is now available. Along with functionality
improvements (see release notes), it also provides fixes for the
following security issues:
QuickTime
CVE-ID: CVE-2007-0711
Available for: Windows Vista/XP/2000
Impact: Viewing a maliciously-crafted 3GP file may lead to an
application crash or arbitrary code execution
Description: An integer overflow exists in QuickTime's handling
of 3GP video files. By enticing a user to open a malicious
movie, an attacker can trigger the overflow, which may lead
to an application crash or arbitrary code execution. This update
addresses the issue by performing additional validation of 3GP
video files. This issue does not affect Mac OS X. Credit to JJ
Reyes for reporting this issue.
QuickTime
CVE-ID: CVE-2007-0712
Available for: Mac OS X v10.3.9 and later, Windows Vista/XP/2000
Impact: Viewing a maliciously-crafted MIDI file may lead to an
application crash or arbitrary code execution
Description: A heap buffer overflow exists in QuickTime's
handling of MIDI files. By enticing a user to open a malicious
MIDI file, an attacker can trigger the overflow, which may lead
to an application crash or arbitrary code execution. This update
addresses the issue by performing additional validation of MIDI
files. Credit to Mike Price of McAfee AVERT Labs for reporting
this issue.
QuickTime
CVE-ID: CVE-2007-0713
Available for: Mac OS X v10.3.9 and later, Windows Vista/XP/2000
Impact: Viewing a maliciously-crafted Quicktime movie file may
lead to an application crash or arbitrary code execution
Description: A heap buffer overflow exists in QuickTime's
handling of QuickTime movie files. By enticing a user to access
a maliciously-crafted movie, an attacker can trigger the
overflow, which may lead to an application crash or arbitrary
code execution. This update addresses the issue by performing
additional validation of QuickTime movies. Credit to Mike Price
of McAfee AVERT Labs, Piotr Bania, and Artur Ogloza (Czestochowa,
Poland) for reporting this issue.
QuickTime
CVE-ID: CVE-2007-0714
Available for: Mac OS X v10.3.9 and later, Windows Vista/XP/2000
Impact: Viewing a maliciously-crafted Quicktime movie file may
lead to an application crash or arbitrary code execution
Description: An integer overflow exists in QuickTime's handling
of UDTA atoms in movie files. By enticing a user to access a
maliciously-crafted movie, an attacker can trigger the overflow,
which may lead to an application crash or arbitrary code
execution. This update addresses the issue by performing
additional validation of QuickTime movies. Credit to Sowhat of
Nevis Labs, and an anonymous researcher working with TippingPoint
and the Zero Day Initiative for reporting this issue.
QuickTime
CVE-ID: CVE-2007-0715
Available for: Mac OS X v10.3.9 and later, Windows Vista/XP/2000
Impact: Viewing a maliciously-crafted PICT file may lead to an
application crash or arbitrary code execution
Description: A heap buffer overflow exists in QuickTime's
handling of PICT files. By enticing a user to open a malicious
PICT image file an attacker can trigger the overflow, which may
lead to arbitrary code execution. This update addresses the
issue by performing additional validation of PICT files. Credit
to Mike Price of McAfee AVERT Labs for reporting this issue.
QuickTime
CVE-ID: CVE-2007-0716
Available for: Mac OS X v10.3.9 and later, Windows Vista/XP/2000
Impact: Opening a maliciously-crafted QTIF file may lead to an
application crash or arbitrary code execution
Description: A stack buffer overflow exists in QuickTime's
handling of QTIF files. By enticing a user to access a
maliciously-crafted QTIF file, an attacker can trigger the
overflow, which may lead to an application crash or arbitrary
code execution. This update addresses the issue by performing
additional validation of QTIF files. Credit to Mike Price of
McAfee AVERT Labs for reporting this issue.
QuickTime
CVE-ID: CVE-2007-0717
Available for: Mac OS X v10.3.9 and later, Windows Vista/XP/2000
Impact: Opening a maliciously-crafted QTIF file may lead to an
application crash or arbitrary code execution
Description: An integer overflow exists in QuickTime's handling
of QTIF files. By enticing a user to access a maliciously-crafted
QTIF file, an attacker can trigger the overflow, which may lead to
an application crash or arbitrary code execution. This update
addresses the issue by performing additional validation of QTIF
files. Credit to Mike Price of McAfee AVERT Labs for reporting
this issue.
QuickTime
CVE-ID: CVE-2007-0718
Available for: Mac OS X v10.3.9 and later, Windows Vista/XP/2000
Impact: Opening a maliciously-crafted QTIF file may lead to an
application crash or arbitrary code execution
Description: A heap buffer overflow exists in QuickTime's
handling of QTIF files. By enticing a user to access a
maliciously-crafted QTIF file, an attacker can trigger the
overflow, which may lead to an application crash or arbitrary
code execution. This update addresses the issue by performing
additional validation of QTIF files. Credit to Ruben Santamarta
working with the iDefense Vulnerability Contributor Program, and
JJ Reyes for reporting this issue.
QuickTime 7.1.5 may be obtained from the Software Update
application, or from the Download area in the QuickTime site
http://www.apple.com/quicktime/download/
For Mac OS X v10.3.9 or later
The download file is named: "QuickTime715.dmg"
Its SHA-1 digest is: 68e621a81560610a37bbf8be5695c751c006627d
QuickTime 7.1.5 for Windows Vista/XP/2000
The download file is named: "QuickTimeInstaller.exe"
Its SHA-1 digest is: 138d028e7b7c77b8938ae65a14369587a7752a85
QuickTime 7.1.5 with iTunes for Windows Vista/XP/2000
The download file is named: "iTunesSetup.exe"
Its SHA-1 digest is: 0a32a8c929cd8f893793a5c260d437726728fe0d
Information will also be posted to the Apple Product Security
web site: http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)
iQEVAwUBRexyRImzP5/bU5rtAQi+vAgAkStJiumk4+tJaygYj6cwzTPlZiPzTfqi
0n8/mUw8XXXHhMYGcnpBnPW1yRlQeZtTpcK7qtb0pQs2Qhc/Uok/SgbUF/ELcgVw
GMh3oqRx8kWqXClT+IEgH+H+wZb2+8UEUgztcbaXCwuCevHSv5oVJ1cx4iphbObk
aKYDBx9DIj18pdcQsbazQmsIrH5Hgt6hpxR/5RTHqORrA2A4EPpXXdCtr4087u+u
IhrpUR9h6noToOXSpCAIS5L4t7B2wJRydsbqEk+VCvP8qqMGxrvoVcKQ2ic+DTBm
IhRUYUP9Z3D3WUsEQ2QCMXMdwIKbA5ypHxuWXp5viPLUUQESXqRTSA==
=BkfW
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce(a)lists.apple.com)
Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/security-announce/site_archiver%40li…
This email sent to site_archiver(a)lists.apple.com
1
0