site_archiver@lists.apple.com Delivered-To: security-announce@lists.apple.com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2009-09-10-2 Security Update 2009-005 Security Update 2009-005 is now available and addresses the following: Alias Manager CVE-ID: CVE-2009-2800 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Opening a maliciously crafted alias file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow exists in the handling of alias files. Opening a maliciously crafted alias file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. This issue does not affect Mac OS X v10.6 systems. Credit: Apple. CarbonCore CVE-ID: CVE-2009-2803 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Opening a file with a maliciously crafted resource fork may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue exists in the Resource Manager's handling of resource forks. Opening a file with a maliciously crafted resource fork may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved validation of resource forks. This issue does not affect Mac OS X v10.6 systems. Credit: Apple. ClamAV CVE-ID: CVE-2009-1241, CVE-2009-1270, CVE-2008-6680, CVE-2009-1371, CVE-2009-1372 Available for: Mac OS X Server v10.5.8 Impact: Multiple vulnerabilities in ClamAV 0.94.2 Description: Multiple vulnerabilities exist in ClamAV 0.94.2, the most serious of which may lead to arbitrary code execution. This update addresses the issues by updating ClamAV to version 0.95.2. ClamAV is distributed only with Mac OS X Server systems. Further information is available via the ClamAV website at http://www.clamav.net/ These issues do not affect Mac OS X v10.6 systems. ColorSync CVE-ID: CVE-2009-2804 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Viewing a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow exists in the handling of images with an embedded ColorSync profile, which may lead to a heap buffer overflow. Opening a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of ColorSync profiles. This issue does not affect Mac OS X v10.6 systems. Credit: Apple. CoreGraphics CVE-ID: CVE-2009-2805 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow in CoreGraphics' handling of PDF files may result in a heap buffer overflow. Opening a PDF file containing a maliciously crafted JBIG2 stream may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Will Dormann of CERT/CC for reporting this issue. This issue does not affect Mac OS X v10.6 systems. CoreGraphics CVE-ID: CVE-2009-2468 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow exists in the drawing of long text strings. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. This issue does not affect Mac OS X v10.6 systems. Credit to Will Drewry of Google Inc. for reporting this issue. CUPS CVE-ID: CVE-2009-0949 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: A remote attacker may be able to deny access to the Printer Sharing service Description: A null pointer dereference exists in CUPS. By repeatedly sending maliciously crafted scheduler requests, a remote attacker may be able to deny access to the Printer Sharing service. This update addresses the issue through improved validation of scheduler requests. This issue does not affect Mac OS X v10.6 systems. Credit to Anibal Sacco of the CORE IMPACT Exploit Writing Team (EWT) at Core Security Technologies for reporting this issue. CUPS CVE-ID: CVE-2009-2807 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: An uprivileged local user may be able to obtain system privileges Description: A heap buffer overflow exists in the CUPS USB backend. This may allow a local user to obtain system privileges. This update addresses the issue through improved bounds checking. This issue does not affect systems prior to Mac OS X v10.5, or Mac OS X v10.6 systems. Flash Player plug-in CVE-ID: CVE-2009-1862, CVE-2009-1863, CVE-2009-1864, CVE-2009-1865, CVE-2009-1866, CVE-2009-1867, CVE-2009-1868, CVE-2009-1869, CVE-2009-1870 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Multiple vulnerabilities in Adobe Flash Player plug-in Description: Multiple issues exist in the Adobe Flash Player plug- in, the most serious of which may lead to arbitrary code execution when viewing a maliciously crafted web site. The issues are addressed by updating the Flash Player plug-in on Mac OS v10.5.8 to version 10.0.32.18, and to version 9.0.246.0 on Mac OS X v10.4.11 systems. For Mac OS X v10.6 systems, these issues are addressed in Mac OS X v10.6.1. Further information is available via the Adobe web site at http://www.adobe.com/support/security/bulletins/apsb09-10.html ImageIO CVE-ID: CVE-2009-2809 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Viewing a maliciously crafted PixarFilm encoded TIFF image may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues exist in ImageIO's handling of PixarFilm encoded TIFF images. Viewing a maliciously crafted PixarFilm encoded TIFF image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through additional validation of PixarFilm encoded TIFF images. This issue does not affect Mac OS X v10.6 systems. Credit: Apple. Launch Services CVE-ID: CVE-2009-2811 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Attempting to open unsafe downloaded content may not lead to a warning Description: This update adds '.fileloc' to the system's list of content types that will be flagged as potentially unsafe under certain circumstances, such as when they are downloaded from an e-mail. While these content types are not automatically opened, if manually opened they could lead to the execution of a malicious payload. This update improves the system's ability to notify users before handling '.fileloc' files. This issue does not affect Mac OS X v10.6 systems. Credit: Apple. Launch Services CVE-ID: CVE-2009-2812 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Visiting a malicious website may lead to arbitrary code execution Description: When an application is downloaded, Launch Services analyzes its exported document types. A design issue in the handling of the exported document types may cause Launch Services to associate a safe file extension with an unsafe Uniform Type Identifier (UTI). Visiting a malicious website may cause an unsafe file type to be opened automatically. This update addresses the issue through improved handling of exported document types from untrusted applications. This issue does not affect systems prior to Mac OS X v10.5, or Mac OS X v10.6 systems. Credit: Apple. MySQL CVE-ID: CVE-2008-2079 Available for: Mac OS X Server v10.5.8 Impact: MySQL is updated to version 5.0.82 Description: MySQL is updated to version 5.0.82 to address an implementation issue that allows a local user to obtain elevated privileges. This issue only affects Mac OS X Server systems. This issue does not affect Mac OS X v10.6 systems. Further information is available via the MySQL web site at http://dev.mysql.com/doc/refman/5.0/en/news-5-0-82.html PHP CVE-ID: CVE-2009-1271, CVE-2009-1272, CVE-2009-0590, CVE-2009-0591, CVE-2009-0789, CVE-2008-5498 Available for: Mac OS X v10.5, Mac OS X Server v10.5.8 Impact: Multiple vulnerabilities in PHP 5.2.8 Description: PHP is updated to version 5.2.10 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP website at http://www.php.net/ These issues do not affect Mac OS X v10.6 systems. SMB CVE-ID: CVE-2009-2813 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Enabling Windows File Sharing may share folders unexpectedly Description: An unchecked error condition exists in Samba. A user who does not have a configured home directory, and connects to the Windows File Sharing service, will be able to access the contents of the file system, subject to local file system permissions. This update addresses the issue by improving the handling of path resolution errors. This issue does not affect systems prior to Mac OS X v10.5, or Mac OS X v10.6 systems. Credit to J. David Hester of LCG Systems National Institutes of Health for reporting this issue. Wiki Server CVE-ID: CVE-2009-2814 Available for: Mac OS X Server v10.5.8 Impact: A remote attacker may gain access to Wiki Server user accounts Description: A cross site scripting issue exists in the Wiki Server's handling of search requests containing non-UTF-8 encoded data. This may allow a remote attacker to access a Wiki server with the credentials of the Wiki Server user performing the search. This update addresses the issue by setting UTF-8 as the default character set in HTTP responses. This issue does not affect systems prior to Mac OS X v10.5, or Mac OS X v10.6 systems. Credit: Apple. Security Update 2009-005 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ For Mac OS X v10.5.8 The download file is named: SecUpd2009-005.dmg Its SHA-1 digest is: d43cff3c40a0917757f6b1ec59286146ee62dfde For Mac OS X Server v10.5.8 The download file is named: SecUpdSrvr2009-005.dmg Its SHA-1 digest is: 3490619467bda4c925ac7cb7843d3d1395984d71 For Mac OS X v10.4.11 (Intel) The download file is named: SecUpd2009-005Intel.dmg Its SHA-1 digest is: 39abe0dec8fbb8f08e0bff5f77b7dcf3b2ae908b For Mac OS X v10.4.11 (PPC) The download file is named: SecUpd2009-005PPC.dmg Its SHA-1 digest is: 77ca15c58ad4d8ddd84e570860e664d3425a2144 For Mac OS X Server v10.4.11 (Universal) The download file is named: SecUpdSrvr2009-005Univ.dmg Its SHA-1 digest is: 1e1c64af2df0023d4b49d544ba3a639fa3e070b6 For Mac OS X Server v10.4.11 (PPC) The download file is named: SecUpdSrvr2009-005PPC.dmg Its SHA-1 digest is: e467f309e59206e140e0d48c76b3ec2f83e56919 Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (Darwin) iQEcBAEBAgAGBQJKqVrZAAoJEHkodeiKZIkBGNoH/3a6WCcxV2Ro3sQe9/zRt0AZ AxxFM1Xi9nfm6KvNtCdt2XVgpFtpSWboJOd1qP6uyNgY5kPt2Njcfwe7f/tz6fi+ KOT0DPTh4tuWCCTUQq+8j4bUQ+TS+c+3lGrTjrMbBhtlp3nzS7TEhNAUBFM62bN1 jSb2Tw0AQ2vM/m6z167zoyKosGdIFys4ACFaHKEjBCNMgb30079ZMA0JPzyFaGE0 JFGKBxdjPOI/EVqD8Jl1VpqHfX5PtgCQ6dfbZvgTdbqlCiN/mzteRgaWjvUdMgDy Q7TBmSdUWH5JSymr8WmiOf66qXAIl3dV/IaeQmIX0kb3zt8xAQseO1MQxo7vEtg= =DWqn -----END PGP SIGNATURE----- _______________________________________________ Do not post admin requests to the list. They will be ignored. Security-announce mailing list (Security-announce@lists.apple.com) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/security-announce/site_archiver%40lis... This email sent to site_archiver@lists.apple.com