APPLE-SA-2009-09-10-2 Security Update 2009-005
APPLE-SA-2009-09-10-2 Security Update 2009-005
- Subject: APPLE-SA-2009-09-10-2 Security Update 2009-005
- From: Apple Product Security <email@hidden>
- Date: Thu, 10 Sep 2009 13:47:32 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2009-09-10-2 Security Update 2009-005
Security Update 2009-005 is now available and addresses the
following:
Alias Manager
CVE-ID: CVE-2009-2800
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Opening a maliciously crafted alias file may lead to an
unexpected application termination or arbitrary code execution
Description: A buffer overflow exists in the handling of alias
files. Opening a maliciously crafted alias file may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue through improved bounds checking. This
issue does not affect Mac OS X v10.6 systems. Credit: Apple.
CarbonCore
CVE-ID: CVE-2009-2803
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Opening a file with a maliciously crafted resource fork may
lead to an unexpected application termination or arbitrary code
execution
Description: A memory corruption issue exists in the Resource
Manager's handling of resource forks. Opening a file with a
maliciously crafted resource fork may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved validation of resource forks.
This issue does not affect Mac OS X v10.6 systems. Credit: Apple.
ClamAV
CVE-ID: CVE-2009-1241, CVE-2009-1270, CVE-2008-6680, CVE-2009-1371,
CVE-2009-1372
Available for: Mac OS X Server v10.5.8
Impact: Multiple vulnerabilities in ClamAV 0.94.2
Description: Multiple vulnerabilities exist in ClamAV 0.94.2, the
most serious of which may lead to arbitrary code execution. This
update addresses the issues by updating ClamAV to version 0.95.2.
ClamAV is distributed only with Mac OS X Server systems. Further
information is available via the ClamAV website at
http://www.clamav.net/ These issues do not affect Mac OS X v10.6
systems.
ColorSync
CVE-ID: CVE-2009-2804
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Viewing a maliciously crafted image with an embedded
ColorSync profile may lead to an unexpected application termination
or arbitrary code execution
Description: An integer overflow exists in the handling of images
with an embedded ColorSync profile, which may lead to a heap buffer
overflow. Opening a maliciously crafted image with an embedded
ColorSync profile may lead to an unexpected application termination
or arbitrary code execution. This update addresses the issue by
performing additional validation of ColorSync profiles. This issue
does not affect Mac OS X v10.6 systems. Credit: Apple.
CoreGraphics
CVE-ID: CVE-2009-2805
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Opening a maliciously crafted PDF file may lead to an
unexpected application termination or arbitrary code execution
Description: An integer overflow in CoreGraphics' handling of PDF
files may result in a heap buffer overflow. Opening a PDF file
containing a maliciously crafted JBIG2 stream may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue through improved bounds checking. Credit
to Will Dormann of CERT/CC for reporting this issue. This issue does
not affect Mac OS X v10.6 systems.
CoreGraphics
CVE-ID: CVE-2009-2468
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: A heap buffer overflow exists in the drawing of long
text strings. Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue through improved bounds checking. This
issue does not affect Mac OS X v10.6 systems. Credit to Will Drewry
of Google Inc. for reporting this issue.
CUPS
CVE-ID: CVE-2009-0949
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: A remote attacker may be able to deny access to the Printer
Sharing service
Description: A null pointer dereference exists in CUPS. By
repeatedly sending maliciously crafted scheduler requests, a remote
attacker may be able to deny access to the Printer Sharing service.
This update addresses the issue through improved validation of
scheduler requests. This issue does not affect Mac OS X v10.6
systems. Credit to Anibal Sacco of the CORE IMPACT Exploit Writing
Team (EWT) at Core Security Technologies for reporting this issue.
CUPS
CVE-ID: CVE-2009-2807
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: An uprivileged local user may be able to obtain system
privileges
Description: A heap buffer overflow exists in the CUPS USB backend.
This may allow a local user to obtain system privileges. This update
addresses the issue through improved bounds checking. This issue does
not affect systems prior to Mac OS X v10.5, or Mac OS X v10.6
systems.
Flash Player plug-in
CVE-ID: CVE-2009-1862, CVE-2009-1863, CVE-2009-1864, CVE-2009-1865,
CVE-2009-1866, CVE-2009-1867, CVE-2009-1868, CVE-2009-1869,
CVE-2009-1870
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Multiple vulnerabilities in Adobe Flash Player plug-in
Description: Multiple issues exist in the Adobe Flash Player plug-
in, the most serious of which may lead to arbitrary code execution
when viewing a maliciously crafted web site. The issues are addressed
by updating the Flash Player plug-in on Mac OS v10.5.8 to version
10.0.32.18, and to version 9.0.246.0 on Mac OS X v10.4.11 systems.
For Mac OS X v10.6 systems, these issues are addressed in Mac OS X
v10.6.1. Further information is available via the Adobe web site at
http://www.adobe.com/support/security/bulletins/apsb09-10.html
ImageIO
CVE-ID: CVE-2009-2809
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Viewing a maliciously crafted PixarFilm encoded TIFF image
may lead to an unexpected application termination or arbitrary code
execution
Description: Multiple memory corruption issues exist in ImageIO's
handling of PixarFilm encoded TIFF images. Viewing a maliciously
crafted PixarFilm encoded TIFF image may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through additional validation of PixarFilm
encoded TIFF images. This issue does not affect Mac OS X v10.6
systems. Credit: Apple.
Launch Services
CVE-ID: CVE-2009-2811
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Attempting to open unsafe downloaded content may not lead to
a warning
Description: This update adds '.fileloc' to the system's list of
content types that will be flagged as potentially unsafe under
certain circumstances, such as when they are downloaded from an
e-mail. While these content types are not automatically opened, if
manually opened they could lead to the execution of a malicious
payload. This update improves the system's ability to notify users
before handling '.fileloc' files. This issue does not affect Mac OS X
v10.6 systems. Credit: Apple.
Launch Services
CVE-ID: CVE-2009-2812
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Visiting a malicious website may lead to arbitrary code
execution
Description: When an application is downloaded, Launch Services
analyzes its exported document types. A design issue in the handling
of the exported document types may cause Launch Services to associate
a safe file extension with an unsafe Uniform Type Identifier (UTI).
Visiting a malicious website may cause an unsafe file type to be
opened automatically. This update addresses the issue through
improved handling of exported document types from untrusted
applications. This issue does not affect systems prior to Mac OS X
v10.5, or Mac OS X v10.6 systems. Credit: Apple.
MySQL
CVE-ID: CVE-2008-2079
Available for: Mac OS X Server v10.5.8
Impact: MySQL is updated to version 5.0.82
Description: MySQL is updated to version 5.0.82 to address an
implementation issue that allows a local user to obtain elevated
privileges. This issue only affects Mac OS X Server systems. This
issue does not affect Mac OS X v10.6 systems. Further information is
available via the MySQL web site at
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-82.html
PHP
CVE-ID: CVE-2009-1271, CVE-2009-1272, CVE-2009-0590, CVE-2009-0591,
CVE-2009-0789, CVE-2008-5498
Available for: Mac OS X v10.5, Mac OS X Server v10.5.8
Impact: Multiple vulnerabilities in PHP 5.2.8
Description: PHP is updated to version 5.2.10 to address multiple
vulnerabilities, the most serious of which may lead to arbitrary code
execution. Further information is available via the PHP website at
http://www.php.net/ These issues do not affect Mac OS X v10.6
systems.
SMB
CVE-ID: CVE-2009-2813
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Enabling Windows File Sharing may share folders unexpectedly
Description: An unchecked error condition exists in Samba. A user
who does not have a configured home directory, and connects to the
Windows File Sharing service, will be able to access the contents of
the file system, subject to local file system permissions. This
update addresses the issue by improving the handling of path
resolution errors. This issue does not affect systems prior to Mac OS
X v10.5, or Mac OS X v10.6 systems. Credit to J. David Hester of LCG
Systems National Institutes of Health for reporting this issue.
Wiki Server
CVE-ID: CVE-2009-2814
Available for: Mac OS X Server v10.5.8
Impact: A remote attacker may gain access to Wiki Server user
accounts
Description: A cross site scripting issue exists in the Wiki
Server's handling of search requests containing non-UTF-8 encoded
data. This may allow a remote attacker to access a Wiki server with
the credentials of the Wiki Server user performing the search. This
update addresses the issue by setting UTF-8 as the default character
set in HTTP responses. This issue does not affect systems prior to
Mac OS X v10.5, or Mac OS X v10.6 systems. Credit: Apple.
Security Update 2009-005 may be obtained from the Software Update
pane in System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
For Mac OS X v10.5.8
The download file is named: SecUpd2009-005.dmg
Its SHA-1 digest is: d43cff3c40a0917757f6b1ec59286146ee62dfde
For Mac OS X Server v10.5.8
The download file is named: SecUpdSrvr2009-005.dmg
Its SHA-1 digest is: 3490619467bda4c925ac7cb7843d3d1395984d71
For Mac OS X v10.4.11 (Intel)
The download file is named: SecUpd2009-005Intel.dmg
Its SHA-1 digest is: 39abe0dec8fbb8f08e0bff5f77b7dcf3b2ae908b
For Mac OS X v10.4.11 (PPC)
The download file is named: SecUpd2009-005PPC.dmg
Its SHA-1 digest is: 77ca15c58ad4d8ddd84e570860e664d3425a2144
For Mac OS X Server v10.4.11 (Universal)
The download file is named: SecUpdSrvr2009-005Univ.dmg
Its SHA-1 digest is: 1e1c64af2df0023d4b49d544ba3a639fa3e070b6
For Mac OS X Server v10.4.11 (PPC)
The download file is named: SecUpdSrvr2009-005PPC.dmg
Its SHA-1 digest is: e467f309e59206e140e0d48c76b3ec2f83e56919
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)
iQEcBAEBAgAGBQJKqVrZAAoJEHkodeiKZIkBGNoH/3a6WCcxV2Ro3sQe9/zRt0AZ
AxxFM1Xi9nfm6KvNtCdt2XVgpFtpSWboJOd1qP6uyNgY5kPt2Njcfwe7f/tz6fi+
KOT0DPTh4tuWCCTUQq+8j4bUQ+TS+c+3lGrTjrMbBhtlp3nzS7TEhNAUBFM62bN1
jSb2Tw0AQ2vM/m6z167zoyKosGdIFys4ACFaHKEjBCNMgb30079ZMA0JPzyFaGE0
JFGKBxdjPOI/EVqD8Jl1VpqHfX5PtgCQ6dfbZvgTdbqlCiN/mzteRgaWjvUdMgDy
Q7TBmSdUWH5JSymr8WmiOf66qXAIl3dV/IaeQmIX0kb3zt8xAQseO1MQxo7vEtg=
=DWqn
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden