Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12664
HistoryMay 14, 2006 - 12:00 a.m.

US-CERT Technical Cyber Security Alert TA06-132A -- Apple Mac Products Affected by Multiple Vulnerabilities

2006-05-1400:00:00
vulners.com
10

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                    National Cyber Alert System

             Technical Cyber Security Alert TA06-132A

Apple Mac Products Affected by Multiple Vulnerabilities

Original release date: May 12, 2006
Last revised: –
Source: US-CERT

Systems Affected

 * Apple Mac OS X version 10.3.9 (Panther) and version 10.4.6 (Tiger)
 * Apple Mac OS X Server version 10.3.9 and version 10.4.6
 * Apple Safari web browser
 * Apple Mail

Previous versions of Mac OS X may also be affected. Please see Apple
Security Update 2006-003 for further information.

Overview

Apple has released Security Update 2006-003 to correct multiple
vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web
browser, Mail, and other products. The most serious of these
vulnerabilities may allow a remote attacker to execute arbitrary code.
Impacts of other vulnerabilities include bypassing security
restrictions and denial of service.

I. Description

Apple Security Update 2006-003 resolves a number of vulnerabilities
affecting Mac OS X, OS X Server, Safari web browser, Mail, and other
products. Further details are available in the individual
Vulnerability Notes.

II. Impact

The impacts of these vulnerabilities vary. For information about
specific impacts, please see the Vulnerability Notes. Potential
consequences include remote execution of arbitrary code or commands,
bypass of security restrictions, and denial of service.

III. Solution

Install an update

Install Apple Security Update 2006-003. This and other updates are
available via Apple Update.

Disable "Open 'safe' files after downloading"

For additional protection, disable the option to "Open 'safe' files
after downloading," as specified in "Securing Your Web Browser."

Appendix A. References

 * Securing Your Web Browser -
   <http://www.us-cert.gov/reading_room/securing_browser/#Safari>

 * Apple Security Update 2006-003 -
   <http://docs.info.apple.com/article.html?artnum=303737>

 * Mac OS X: Updating your software -
   <http://docs.info.apple.com/article.html?artnum=106704>

These vulnerabilities were reported in Apple Security Update 2006-003.
Please see the Vulnerability Notes for individual reporter
acknowledgements.


The most recent version of this document can be found at:

 <http://www.us-cert.gov/cas/techalerts/TA06-132A.html>

Feedback can be directed to US-CERT Technical Staff. Please send
email to <[email protected]> with "TA06-132A Feedback VU#519473" in the
subject.


For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html&gt;.


Produced 2006 by US-CERT, a government organization.

Terms of use:

 &lt;http://www.us-cert.gov/legal.html&gt;

Revision History

May 12, 2006: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRGTxnX0pj593lg50AQKebgf+PTa7qCt6QQRcXGlJ3vjPFOdO1VNRMGr8
WOP8JKHbCK93O3E6YtHJ3nQTJBfyq169TQijWvoWvjjXM603DojGXUXgTBZFhTSG
c4L0jE2+nD3273nZXGPreFJAsPxK6me7d4Of/KQ/prJnUfrnWNxfrP90CmXRKNLD
+4eC4BEjNXCqpb0ki62WQM7NED6IgfgNZWfO7faTSRYNRdEyLAgetQxZVm5eepyK
BJO3rRBBRkOIkIIG5o/J5ViqgiuUP75N37QqTc7BtyzQR2OeWepytJvkMvJUBVAG
r0fLUKvhT4wdHxsNGVGCxLNf3NHG1UuWNO3UZ9MeBmREdmeT+K0l9A==
=cabu
-----END PGP SIGNATURE-----