APPLE-SA-2009-12-03-1 Java for Mac OS X 10.6 Update 1
site_archiver@lists.apple.com Delivered-To: security-announce@lists.apple.com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2009-12-03-1 Java for Mac OS X 10.6 Update 1 Java for Mac OS X 10.6 Update 1 is now available and addresses the following: Java CVE-ID: CVE-2009-3869, CVE-2009-3871, CVE-2009-3875, CVE-2009-3874, CVE-2009-3728, CVE-2009-3872, CVE-2009-3868, CVE-2009-3867, CVE-2009-3884, CVE-2009-3873, CVE-2009-3877, CVE-2009-3865, CVE-2009-3866 Available for: Mac OS X v10.6.2 and later, Mac OS X Server v10.6.2 and later Impact: Multiple vulnerabilities in Java 1.6.0_15 Description: Multiple vulnerabilities exist in Java 1.6.0_15, the most serious of which may allow an untrusted Java applet to obtain elevated privileges. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_17. Further information is available via the Sun Java website at http://java.sun.com/javase/6/webnotes/ReleaseNotes.html Credit to Kevin Finisterre of Netragard for reporting CVE-2009-3867 to Apple. Java CVE-ID: CVE-2009-2843 Available for: Mac OS X v10.6.2 and later, Mac OS X Server v10.6.2 and later Impact: An expired certificate for a Java applet is treated as valid Description: An expired certificate for a Java applet is treated as valid. This issue is addressed through improved handling of expired certificates. Credit to Simon Heimlicher of ETH Zurich for reporting this issue. Java for Mac OS X 10.6 Update 1 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ The download file is named: JavaForMacOSX10.6Update1.dmg Its SHA-1 digest is: e31791c61b56c7db104baffb00971fad88feb8e4 Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (Darwin) iQEcBAEBAgAGBQJLGCXhAAoJEHkodeiKZIkBfYYH+wWCoTSr8nBo5yp24JjNg20/ +PmLKPblICrGixTtwvVym06gwUw9ZzfNx0Q1/7AsbLo5xj7IkEGFKppMdvQKERP5 ILF1+QFthrLJ0QiJSkLWoOCAr02qyY/2iosl09gnWtODX+pDxYHhcWrVwvGAbYh1 sYgxqq6xWoLxtD1elB30DSpeCVAOMBfQbs1nhyIhVZlILnw8OTWK4QVqbBWwS6ae oP35rXm4xkBTrnQxrTkIWCFEpX2i92dcR17QA9HF4mnanxBTQSzW6AR3Y8RBIEG8 vU5/tMX+Q/eBkO3q3Ds0phmQ7Qo9dVO6tL8rzWIUPBEkF1KDpZqh1CrCMXEJIMM= =0Mni -----END PGP SIGNATURE----- _______________________________________________ Do not post admin requests to the list. They will be ignored. Security-announce mailing list (Security-announce@lists.apple.com) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/security-announce/site_archiver%40lis... This email sent to site_archiver@lists.apple.com
participants (1)
-
Apple Product Security