US-CERT Technical Cyber Security Alert TA05-229A -- Apple Mac Products are Affected by Multiple Vulnerabilities

18/08/05, US-CERT Technical Cyber Security Alert TA05-229A -- Apple Mac Products are Affected by Multiple Vulnerabilities
From: CERT Advisory <cert-advisory@cert.org>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: cert-advisory@cert.org
Subject: US-CERT Technical Cyber Security Alert TA05-229A -- Apple Mac Products are Affected by Multiple Vulnerabilities
From: CERT Advisory <cert-advisory@cert.org>
Date: Wed, 17 Aug 2005 15:30:39 -0400
List-archive: <http://www.cert.org/>
List-help: <http://www.cert.org/>, <mailto:Majordomo@cert.org?body=help>
List-owner: <mailto:cert-advisory-owner@cert.org>
List-post: NO (posting not allowed on this list)
List-unsubscribe: <mailto:Majordomo@cert.org?body=unsubscribe%20cert-advisory>
Organization: CERT(R) Coordination Center - +1 412-268-7090

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                  National Cyber Alert System

            Technical Cyber Security Alert TA05-229A 


Apple Mac Products are Affected by Multiple Vulnerabilities

   Original release date: August 17, 2005
   Last revised: --
   Source: US-CERT


Systems Affected

     * Apple Mac OS X version 10.3.9 (Panther) and version 10.4.2 (Tiger)
     * Apple Mac OS X Server version 10.3.9 and version 10.4.2
     * Apple Safari web browser

   Please see Apple Security Update 2005-007 for further information.


Overview

   Apple has released Security Update 2005-007 to address multiple
   vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web
   browser, and other products. The most serious of these vulnerabilities
   may allow a remote attacker to execute arbitrary code. Impacts of
   other vulnerabilities include bypassing security restrictions and
   denial of service.


I. Description

   Apple Security Update 2005-007 resolves a number of vulnerabilities
   affecting Mac OS X, OS X Server, Safari web browser, and other
   products. Further details are available in the following Vulnerability
   Notes:

   VU#913820 - Apple Mac OS X Directory Services contains a buffer
   overflow

   A buffer overflow in Apple Mac OS X Directory Service's authentication
   process may allow a remote, unauthenticated attacker to execute
   arbitrary code on a vulnerable system.
   (CAN-2005-2507)

   VU#461412 - Apple Mac OS X Server servermgrd authentication vulnerable
   to buffer overflow

   Apple Mac OS X Server servermgrd contains an unspecified buffer
   overflow vulnerability in its authentication handling routines. This
   vulnerability may lead to remote execution of arbitrary code.
   (CAN-2005-2518)

   VU#435188 - Apple Mac OS X AppKit vulnerable to buffer overflow via
   the handling of maliciously crafted rich text files

   A buffer overflow vulnerability exists in a component of Apple's Mac
   OS X operating system that handles rich text files.
   (CAN-2005-2501)

   VU#172948 - Apple Mac OS X AppKit vulnerable to buffer overflow via
   maliciously crafted Microsoft Word files

   A buffer overflow vulnerability exists in a component of Apple's Mac
   OS X operating system that handles Microsoft Word files.
   (CAN-2005-2502)

   VU#420316 - Apple Mac OS X Safari vulnerable to arbitrary command
   execution via URLs in PDF files

   Apple Mac OS X WebKit and Safari security controls may be bypassed,
   possibly allowing remote command execution.
   (CAN-2005-2522)

   VU#709220 - Apple Safari fails to perform security checks on links in
   rich text content

   Apple Safari fails to perform security checks on hyperlinks in rich
   text content, which may allow an attacker to execute arbitrary
   commands on a vulnerable system.
   (CAN-2005-2516)

   Please note that Apple Security Update 2005-007 addresses
   additional vulnerabilities not described above. As further
   information becomes available, we will publish individual
   Vulnerability Notes.


II. Impact

   The impacts of these vulnerabilities vary. For information about
   specific impacts please see the Vulnerability Notes. Potential
   consequences include remote execution of arbitrary code or commands,
   bypass of security restrictions, and denial of service.


III. Solution

Install an update

   Install the update as described in Apple Security Update 2005-007. In
   addition, this update is available via Apple Update.


Appendix A. References

     * US-CERT Vulnerability Note VU#913820 -
       <http://www.kb.cert.org/vuls/id/913820>

     * US-CERT Vulnerability Note VU#461412 -
       <http://www.kb.cert.org/vuls/id/461412>

     * US-CERT Vulnerability Note VU#435188 -
       <http://www.kb.cert.org/vuls/id/435188>

     * US-CERT Vulnerability Note VU#172948 -
       <http://www.kb.cert.org/vuls/id/172948>

     * US-CERT Vulnerability Note VU#420316 -
       <http://www.kb.cert.org/vuls/id/420316>

     * US-CERT Vulnerability Note VU#709220 -
       <http://www.kb.cert.org/vuls/id/709220>

     * Apple Security Update 2005-007 -
       <http://docs.info.apple.com/article.html?artnum=302163>

     * Mac OS X: Updating your software -
       <http://docs.info.apple.com/article.html?artnum=106704>


 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA05-229A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT. Please send email to
   <cert@cert.org> with "TA05-229A Feedback VU#913820" in the subject.
 ____________________________________________________________________

   Mailing list information:

     <http://www.us-cert.gov/cas/>
 ____________________________________________________________________

   Produced 2005 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   August 17, 2005: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQwOKkRhoSezw4YfQAQLxywgAkWTcoA3KoWAiY5YYPGejCVbWw/yFzAqy
4Fb0z9WXfwhwB3/L/IxLvJGhPdVF/b6buP/KZgIxalwsRu6GPjJp5Aj+Cbtf/8KI
2ca0bRxS3vZJS52ZOEVpS2Z2M8JdcBA2CgfvIw6GEklXD9MTjXXwYUhB6tYK4Ar0
+UAk6xxaaMRvKztOYbRZhy5/5Kz2Xd9a5UwO/hbojQmilv4elW3iZhGWP+nLEpSI
D680yttkY++UzmYGYHO0Wm+SAK4fzXKxs/4PMfWvNgP8lKJsHXjjr7KLFtmgCiWU
oxhOB8RdqVNTKE2kYEq1kiopusBtwK/x35VNr3uCjg23CxYuv8HAjw==
=yJpi
-----END PGP SIGNATURE-----

Previous message sorted by date: US-CERT Technical Cyber Security Alert TA05-224A -- VERITAS Backup Exec Uses Hard-Coded Authentication Credentials
Next message sorted by date: US-CERT Technical Cyber Security Alert TA05-284A -- Microsoft Windows, Internet Explorer, and Exchange Server Vulnerabilities
Previous message sorted by thread: US-CERT Technical Cyber Security Alert TA05-224A -- VERITAS Backup Exec Uses Hard-Coded Authentication Credentials
Next message by thread: US-CERT Technical Cyber Security Alert TA05-284A -- Microsoft Windows, Internet Explorer, and Exchange Server Vulnerabilities
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Oct 2005