APPLE-SA-0024-09-07 Security Update 2003-09-07
APPLE-SA-0024-09-07 Security Update 2003-09-07
- Subject: APPLE-SA-0024-09-07 Security Update 2003-09-07
- From: Apple Product Security <email@hidden>
- Date: Tue, 7 Sep 2004 13:03:56 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2004-09-07 Security Update 2004-09-07
Security Update 2004-09-07 is now available and delivers security
enhancements for the following system versions:
* Mac OS X v10.3.5 "Panther"
* Mac OS X v10.3.4 "Panther"
* Mac OS X v10.2.8 "Jaguar"
* Mac OS X Server v10.3.5 "Panther"
* Mac OS X Server v10.3.4 "Panther"
* Mac OS X Server v10.2.8 "Jaguar"
Given the relatively recent release of the Mac OS X v10.3.5 Software
Update, this security update is available for both Mac OS X v10.3.4
and Mac OS X v10.3.5. Customers who are still evaluating Mac OS X
v10.3.5 for large-scale deployment can apply the security update for
Mac OS X v10.3.4 to increase the security of their systems during the
evaluation period. After updating to Mac OS X v10.3.5, Security
Update 2004-09-07 should be installed onto Mac OS X v10.3.5 even if it
was previously installed on a Mac OS X v10.3.4 system.
This security update is also available for the previous major release,
"Jaguar". All security enhancements present in the Panther version of
this security update are also available for Jaguar if the issue could
occur on Jaguar systems.
The following components are updated:
Component: Apache 2
CVE-IDs: CAN-2004-0493, CAN-2004-0488
Available for: Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac
OS X Server v10.3.5
Impact: Exposure to a potential Denial of Service.
Description: The Apache Organization has released Apache version
2.0.50. This release fixes a number of denial of service
vulnerabilities. We have updated Apache to version 2.0.50 which only
ships with Mac OS X Server, and is off by default.
Component: CoreFoundation
CVE-ID: CAN-2004-0821
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: Privileged programs using CoreFoundation can be made to load
a user supplied library.
Description: Bundles using the CoreFoundation CFPlugIn facilities
can include directions to automatically load plugin executables. With
a specially crafted bundle this could also occur for privileged
programs, permitting a local privilege escalation. CoreFoundation now
prevents automatic executable loading for bundles that already have a
loaded executable. Credit to Kikuchi Masashi <email@hidden>
for reporting this issue.
Component: CoreFoundation
CVE-ID: CAN-2004-0822
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: An environment variable can be manipulated to cause a buffer
overflow which can result in a privilege escalation
Description: By manipulating an environment variable a program could
potentially be made to execute arbitrary code by a local attacker.
This can only be exploited with access to a local account. Stricter
validity checks are now performed for this environment variable.
Credit to <email@hidden> for reporting this issue.
Component: IPSec
CVE-ID: CAN-2004-0607
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: When using certificates, unauthenticated hosts may be able to
negotiate an IPSec connection.
Description: When configured to use X.509 certificates to
authenticate remote hosts, a certificate verification failure does not
abort the key exchange. Mac OS X does not use certificates for IPSec
by default so this issue only affects configurations that have been
manually configured. IPSec now verifies and aborts a key exchange if a
certificate verification failure occurs.
Component: Kerberos
CVE-ID: CAN-2004-0523
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: Multiple buffer overflows in krb5_aname_to_localname for MIT
Kerberos 5 (krb5) 1.3.3 and earlier could permit remote attackers to
execute arbitrary code.
Description: The buffer overflow can only be exploited if
"auth_to_local_names" or "auth_to_local" support is also configured
in the edu.mit.Kerberos file. Apple does not enable this by default.
The security fix was back ported and applied to the Mac OS X versions
of Kerberos. The Mac OS X and Mac OS X Server version of Kerberos is
not susceptible to the recent "double-free" issue reported in the CERT
vulnerability note VU#350792 (CAN-2004-0772). Credit to the MIT
Kerberos Development Team for informing us of this issue.
Component: lukemftpd
CVE-ID: CAN-2004-0794
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: A race condition that can permit an authenticated remote
attacker to cause a denial of service or execute arbitrary code
Description: If the FTP service has been enabled, and a remote
attacker can correctly authenticate, then a race condition would
permit them to stop the FTP service or execute arbitary code. The fix
is to replace the lukemftpd FTP service with tnftpd. lukemftp is
installed but not activated in Mac OS X Server, which instead uses
xftp. Credit to Luke Mewburn of the NetBSD Foundation for informing
us of this issue.
Component: OpenLDAP
CVE-ID: CAN-2004-0823
Available for: Mac OS X v10.3.4, Mac OS X v10.3.5, Mac OS X Server
v10.3.4, Mac OS X Server v10.3.5
Impact: A crypt password can be used as if it were a plain text
password
Description: Backwards compatibility with older LDAP implementations
permits the storing of a crypt password in the userPassword attribute.
Some authentication validation schemes can use this value as if it
were a plain text password. The fix removes the ambiguity and always
uses this type of field as a crypt password. This issue does not
occur in Mac OS X 10.2.8. Credit to Steve Revilak of Kayak Software
Corporation for reporting this issue.
Component: OpenSSH
CVE-ID: CAN-2004-0175
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: A malicious ssh/scp server can overwrite local files
Description: A directory traversal vulnerability in the scp program
permits a malicious remote server to overwrite local files. The
security fix was backported and applied to the Mac OS X versions of
OpenSSH.
Component: PPPDialer
CVE-ID: CAN-2004-0824
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: A malicious user can overwrite system files resulting in a
local privilege escalation
Description: PPP components performed insecure accesses of a file
stored in a world-writeable location. The fix moves the log files to
a non-world-writeable location.
Component: QuickTime Streaming Server
Available for: Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac
OS X Server v10.3.5
CVE-ID: CAN-2004-0825
Impact: A denial of service requiring a restart of the QuickTime
Streaming Server
Description: A particular sequence of client operations can cause a
deadlock on the QuickTime Streaming Server. The fix updates the code
to eliminate this deadlock condition.
Component: rsync
CVE-ID: CAN-2004-0426
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: When rsync is run in daemon mode a remote attacker can write
outside of the module path unless the chroot option has been set.
Description: rsync before version 2.6.1 does not properly sanitize
paths when running a read/write daemon with the chroot option turned
off. The fix updates rsync to version 2.6.2.
Component: Safari
CVE-ID: CAN-2004-0361
Available for: Mac OS X v10.2.8, Mac OS X Server v10.2.8
Impact: A JavaScript array of negative size can cause Safari to access
out of bounds memory resulting in an application crash.
Description: Storing objects into a JavaScript array allocated
with negative size can overwrite memory. Safari now stops processing
JavaScript programs if an array allocation fails.
This security enhancement was previously made available in Safari
1.0.3, and is being applied inside the Mac OS X 10.2.8 operating
system as an extra layer of protection for customers who have not
installed that version of Safari. This is a specific fix for Mac OS X
v10.2.8 and the issue does not exist in Mac OS X v10.3 or later
systems.
Component: Safari
CVE-ID: CAN-2004-0720
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: An untrusted web site can inject content into a frame intended
to be used by another domain.
Description: A web site that uses multiple frames can have some of its
frames replaced with content from a malicious site if the malicious
site is visited first. The fix imposes a set of parent/child rules
preventing the attack.
Component: SquirrelMail
CVE-ID: CAN-2004-0521
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: SquirrelMail before 1.4.3 RC1 allows remote attackers to
execute unauthorized SQL statements
Description: SquirrelMail before 1.4.3 RC1 is vulnerable to SQL
injection which permits unauthorized SQL statements to be run. The fix
updates SquirrelMail to version 1.4.3a
Component: tcpdump
CVE-IDs: CAN-2004-0183, CAN-2004-0184
Available for: Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5,
Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, Mac OS X Server
v10.3.5
Impact: Maliciously crafted packets can cause a crash of a running
tcpdump
Description: The detailed printing functions for ISAKMP packets do not
perform correct bounds checking and cause an out-of-bounds read which
results in a crash. The fix updates tcpdump to version 3.8.3.
================================================
Security Update 2004-09-07 may be obtained from the Software Update
pane in System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
For Mac OS X v10.3.5 "Panther"
=====================================
The download file is named: "SecUpd2004-09-07PanMClient.dmg"
Its SHA-1 digest is: aa8bc2d78c37778cca3619f42dafdee5775bc7a6
For Mac OS X v10.3.4 "Panther"
=====================================
The download file is named: "SecUpd2004-09-07PanClient.dmg"
Its SHA-1 digest is: a37cd43439f4e82d05d07924101e370d96dc41a9
For Mac OS X v10.2.8 "Jaguar"
=====================================
The download file is named: "SecUpd2004-09-07JagClient.dmg"
Its SHA-1 digest is: 6f0ee457b5a729ef68fb50fc55417db400b52365
For Mac OS X Server v10.3.5 "Panther"
=====================================
The download file is named: "SecUpdSrvr2004-09-07PanM.dmg"
Its SHA-1 digest is: 8766c93d5675f8d1d9ebec67e80b7a94d16a1858
For Mac OS X Server v10.3.4 "Panther"
=====================================
The download file is named: "SecUpdSrvr2004-09-07PanL.dmg"
Its SHA-1 digest is: 7f4674515ff0172a2df9a451240410ac24459753
For Mac OS X Server v10.2.8 "Jaguar"
=====================================
The download file is named: "SecUpdSrvr2004-09-07Jag.dmg"
Its SHA-1 digest is: 099290119b6f47d935e8d064c36a90b0ad7acaf8
Information will also be posted to the Apple Product Security
web site:
http://www.apple.com/support/security/security_updates.html
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/security_pgp.html
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
iQEVAwUBQT4T5Zyw5owIz4TQAQIqXgf/XdTaVdvJsa2EjjsoWTnVd3FbJhYj7bky
Hz/69F8iQat+obSvnArrA39EgUkZzFzhep1stU/JjXk0FX3eGBLa1S4KjemNTqPx
LgHWFu4F5BgxeOgkhQrR8faXs2dujTvRH+HX4ADVzZioznDLuqrzrs5EJZDk92NQ
TAUvplMCHgA9H4LWVE9V4MHaUO7gtTskViqHr/XGt4Gu1+TtDLnQo8A4+c27swmP
MavEDVhuSOcCyf8yYSpZiFrtzzVjoaC8Vemg1L53/sA0i3zjMb+H4wizACBnJBG/
L5U/itPiU7TkD6a8ydIFk1Ksd5wbO/kE94Ka6VeeL5JcuGLN2E9L5w==
=x5fK
-----END PGP SIGNATURE-----
_______________________________________________
security-announce mailing list | email@hidden
Help/Unsubscribe/Archives: http://www.lists.apple.com/mailman/listinfo/security-announce
Do not post admin requests to the list. They will be ignored.