Copyright 2024 - CSIM - Asian Institute of Technology

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Subject: US-CERT Technical Cyber Security Alert TA06-333A -- Apple Releases Security Update to Address Multiple Vulnerabilities
From: CERT Advisory <This email address is being protected from spambots. You need JavaScript enabled to view it.>
Date: Wed, 29 Nov 2006 16:12:59 -0500


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                   National Cyber Alert System

            Technical Cyber Security Alert TA06-333A


Apple Releases Security Update to Address Multiple Vulnerabilities

   Original release date: November 29, 2006
   Last revised: --
   Source: US-CERT


Systems Affected

     * Apple Mac OS X version 10.3.x and 10.4.x
     * Apple Mac OS X Server version 10.3.x and 10.4.x
     * Apple Safari web browser

   These vulnerabilities affect both Intel-based and PowerPC-based Apple
   systems.


Overview

   Apple has released Security Update 2006-007 to correct multiple
   vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web
   browser. Vulnerabilities in OpenSSL, gzip, and other products are also
   addressed. The most serious of these vulnerabilities may allow a
   remote attacker to execute arbitrary code. Attackers may take
   advantage of the less serious vulnerabilities to bypass security
   restrictions or cause a denial of service.


I. Description

   Apple Security Update 2006-007 addresses a number of vulnerabilities
   affecting Mac OS X, OS X Server, Safari web browser, and other
   products. Further details are available in the related vulnerability
   notes.

   This security update also addresses previously known vulnerabilities
   in PHP, Perl, OpenSSL, and gzip, which are shipped with Mac OS X. The
   OpenSSL vulnerabilities are documented in multiple vulnerability
   notes. Information is also available through the OpenSSL
   vulnerabilities page. Information about the vulnerabilities in gzip is
   available in a series of vulnerability notes.


II. Impact

   The impacts of these vulnerabilities vary. For specific details, see
   the appropriate vulnerability notes. Potential consequences include
   remote execution of arbitrary code or commands, bypass of security
   restrictions, and denial of service.


III. Solution

Install updates

   Install Apple Security Update 2006-007. This and other updates are
   available via Apple Update or via Apple Downloads.


IV. References

     * Vulnerability Notes for Apple Security Update 2006-007 -
       <http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-007>

     * Vulnerability Notes for OpenSSL Security Advisory [28th September
       2006] -
<http://www.kb.cert.org/vuls/byid?searchview&query=openssl_secadv_20060928>

     * Vulnerability Note VU#845620 -
       <http://www.kb.cert.org/vuls/id/845620>

     * Vulnerability Note VU#933712 -
       <http://www.kb.cert.org/vuls/id/933712>

     * Vulnerability Note VU#381508 -
       <http://www.kb.cert.org/vuls/id/381508>

     * Vulnerability Note VU#554780 -
       <http://www.kb.cert.org/vuls/id/554780>

     * Vulnerability Note VU#596848 -
       <http://www.kb.cert.org/vuls/id/596848>

     * Vulnerability Note VU#773548 -
       <http://www.kb.cert.org/vuls/id/773548>

     * About the security content of Security Update 2006-007 -
       <http://docs.info.apple.com/article.html?artnum=304829>

     * Mac OS X: Updating your software -
       <http://docs.info.apple.com/article.html?artnum=106704>

     * Apple Downloads - <http://www.apple.com/support/downloads/>

     * OpenSSL: OpenSSL vulnerabilities -
       <http://www.openssl.org/news/vulnerabilities.html>

     * Securing Your Web Browser -
       <http://www.us-cert.gov/reading_room/securing_browser/#Safari>

 _________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA06-333A.html>
 _________________________________________________________________

 Feedback can be directed to US-CERT Technical Staff. Please send
 email to <This email address is being protected from spambots. You need JavaScript enabled to view it.> with "TA06-333A Feedback VU#191336" in the
 subject.
 _________________________________________________________________

 Produced 2006 by US-CERT, a government organization.

 Terms of use:

   <http://www.us-cert.gov/legal.html>

 _________________________________________________________________

   Revision History

   November 29, 2006: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRW33NuxOF3G+ig+rAQJtiggApJKRh7x+z8vp0xb26sE16RUOD3epcrk6
lJZ4rXnqVqoFacAt0Ucb8T43/Uc4N85UMa695YbFspYZum3hcGZo+WnNPolGUeRz
iN/4bfKgzekfpbHxf6T3YvQYp+PVMRfHPUcxfaZDYXhu2813N4SSQpM59KRL5BD7
xr+5VvB09biVKlzpEdgtk2EHcqc+sMF5+o3cCgDJCnJNL+NG4J6d/hsyNP15ekTf
8m0W4rJonUe2gR2Bp7F1Y47KgRr3BT1aH2gxUSim9qEJpPdP/CkmGoFp+BfrFP9q
A580LOrqFK8HIly1fbPKb26p2theUUESnQqM9Ob8xolkCDLy6h7ssg==
=f7N+
-----END PGP SIGNATURE-----
Powered by: MHonArc

Login Form

Search

School of Engineering and technologies     Asian Institute of Technology