Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14514
HistoryOct 02, 2006 - 12:00 a.m.

[SA22187] Mac OS X Security Update Fixes Multiple Vulnerabilities

2006-10-0200:00:00
vulners.com
29

TITLE:
Mac OS X Security Update Fixes Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA22187

VERIFY ADVISORY:
http://secunia.com/advisories/22187/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Spoofing, Exposure of sensitive information,
Privilege escalation, DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/

DESCRIPTION:
Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities.

1) An error in the CFNetwork component may allow a malicious SSL site
to pose as a trusted SLL site to CFNetwork clients (e.g. Safari).

2) Various errors in the Flash Player can be exploited by malicious
people to bypass security restrictions and compromise a vulnerable
system.

For more information:
SA20971
SA21865

3) A boundary error in the ImageIO component when processing JPEG2000
images can be exploited to cause a buffer overflow and may allow
execution of arbitrary code.

4) An error in the kernel's error handling mechanism known as Mach
exception ports can be exploited by malicious, local users to execute
arbitrary code in privileged applications.

5) An unchecked error condition in the LoginWindow component may
result in Kerberos tickets being accessible to other local users
after an unsuccessful attempt to log in.

6) Another error in the LoginWindow component during the handling of
"Fast User Switching" may result in Kerberos tickets being accessible
to other local users.

7) A logic error in the LoginWindow component may allow network
accounts without GUIDs to bypass the LoginWindow service access
controls.

8) An error makes it possible for an account to manage WebObjects
applications after the "Admin" privileges have been revoked.

9) A memory corruption error in QuickDraw Manager when processing
PICT images can potentially be exploited via a specially crafted PICT
image to execute arbitrary code.

10) An error in SASL can be exploited by malicious people to cause a
DoS (Denial of Service) against the IMAP service.

For more information:
SA19618

11) A memory management error in WebKit's handling of certain HTML
can be exploited by malicious people to compromise a user's system.

For more information:
SA21271

12) An error in Workgroup Manager may result in accounts in a NetInfo
parent to use crypt even though they appear to use ShadowHash
passwords.

SOLUTION:
Update to version 10.4.8 or apply Security Update 2006-006.

Mac OS X 10.4.8 Update (Intel):
http://www.apple.com/support/downloads/macosx1048updateintel.html

Security Update 2006-006 (10.3.9 Client):
http://www.apple.com/support/downloads/securityupdate20060061039client.html

Security Update 2006-006 (10.3.9 Server):
http://www.apple.com/support/downloads/securityupdate20060061039server.html

Mac OS X 10.4.8 Update (PPC):
http://www.apple.com/support/downloads/macosx1048updateppc.html

Mac OS X 10.4.8 Combo Update (PPC):
http://www.apple.com/support/downloads/macosx1048comboupdateppc.html

Mac OS X 10.4.8 Combo Update (Intel):
http://www.apple.com/support/downloads/macosx1048comboupdateintel.html

Mac OS X Server 10.4.8 Update (PPC):
http://www.apple.com/support/downloads/macosxserver1048updateppc.html

Mac OS X Server 10.4.8 Combo Update (PPC):
http://www.apple.com/support/downloads/macosxserver1048comboupdateppc.html

Mac OS X Server 10.4.8 Update (Universal):
http://www.apple.com/support/downloads/macosxserver1048updateuniversal.html

PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Adam Bryzak, Queensland University of
Technology.
3) The vendor credits Tom Saxton, Idle Loop Software Design.
4) The vendor credits Dino Dai Zovi, Matasano Security.
5) The vendor credits Patrick Gallagher, Digital Peaks Corporation.
6) The vendor credits Ragnar Sundblad, Royal Institute of
Technology.
8) The vendor credits Phillip Tejada, Fruit Bat Software.
12) The vendor credits Chris Pepper, The Rockefeller University.

ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=304460

OTHER REFERENCES:
SA19618:
http://secunia.com/advisories/19618/

SA20971:
http://secunia.com/advisories/20971/

SA21271:
http://secunia.com/advisories/21271/

SA21865:
http://secunia.com/advisories/21865/


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.