exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Apple Security Advisory 2004-06-07

Apple Security Advisory 2004-06-07
Posted Jun 9, 2004
Authored by Apple | Site apple.com

APPLE-SA-2004-06-07 Security Update 2004-06-07 - This update delivers a number of security enhancements and is recommended for all Macintosh users. Components affected are LaunchServices, DiskImageMounter, Safari, and Terminal.

tags | advisory
systems | apple
advisories | CVE-2004-0538, CVE-2004-0539
SHA-256 | 59fd02c4f507b9775c09dffe05378c28284267ea48414acb84bfea214fff884e

Apple Security Advisory 2004-06-07

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2004-06-07 Security Update 2004-06-07

Description

Security Update 2004-06-07 delivers a number of security enhancements
and is recommended for all Macintosh users. The purpose of this
update is to increase security by alerting you when opening an
application for the first time via document mappings or a web address
(URL). For more details, including a description of the new alert
dialog box, please see:
http://docs.info.apple.com/article.html?artnum=25785

Versions: Security Update 2004-06-07 is available for the following
system versions:
* Mac OS X v10.3.4 "Panther"
* Mac OS X Server v10.3.4 "Panther"
* Mac OS X v10.2.8 "Jaguar"
* Mac OS X Server v10.2.8 "Jaguar"

The following components are updated:

Component: LaunchServices
CVE-ID: CAN-2004-0538
Impact: LaunchServices automatically registers applications,
which could be used to cause the system to run unexpected
applications.
Discussion: LaunchServices is a system component that discovers and
opens applications. This system component has been modified to only
open applications that have previously been explicitly run on the
system. Attempts to run an application that has not previously been
explicitly run will result in a user alert. Further information is
available in http://docs.info.apple.com/article.html?artnum=25785

Component: DiskImageMounter
CVE-ID: No CVE ID has been reserved as this is only an
additional preventative measure.
Impact: The disk:// URI type mounts an anonymous remote file
system using the http protocol.
Discussion: The registration of the disk:// URI type is removed
from the system as a preventative measure against attempts to
automatically mount remote disk image file systems.

Component: Safari
CVE-ID: CAN-2004-0539
Impact: The "Show in Finder" button would open certain
downloaded
files, in some cases executing downloaded applications.
Discussion: The "Show in Finder" button will now reveal files in a
Finder window and will no longer attempt to open them. This
modification is only available for Mac OS X v10.3.4 "Panther" and Mac
OS X Server v10.3.4 "Panther" systems as the issue does not apply to
Mac OS X v10.2.8 "Jaguar" or Mac OS X Server v10.2.8 "Jaguar".

Component: Terminal
CVE-ID: Not applicable
Impact: Attempts to use a telnet:// URI with an alternate port
number fail.
Discussion: A modification has been made to allow the specification
of an alternate port number in a telnet:// URI. This restores
functionality that was removed with the recent fix for CAN-2004-0485.

================================================

Security Update 2004-06-07 may be obtained from:

* Software Update pane in System Preferences

* Apple's Software Downloads web site:

For Mac OS X v10.3.4 "Panther" and Mac OS X Server v10.3.4
==========================================================
http://www.apple.com/support/downloads/
Click on: Security Update 2004-06-07 (10.3.4)
The download file is named: "SecUpd2004-06-07Pan.dmg"
Its SHA-1 digest is: 182745485d8db3ea29ec67cb603cc5668a4f60d9

For Mac OS X v10.2.8 "Jaguar" and Mac OS X Server v10.2.8
=========================================================
http://www.apple.com/support/downloads/
Click on: Security Update 2004-06-07 (10.2.8)
The download file is named: "SecUpd2004-06-07Jag.dmg"
Its SHA-1 digest is: e5fa73f6a67bdcd9af76927d3416974f039b2087

Information will also be posted to the Apple Product Security
web site:
http://www.apple.com/support/security/security_updates.html

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/security_pgp.html

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2

iQEVAwUBQMTXipyw5owIz4TQAQJabgf/XdzbpuwKuBbVYQAVUl8mZd+Bs7QVdF2x
sVJiNlgjyObJjTd5sjqCP9695enrEhClliNM+qOtoUcj0ed4gKIWtOBDzPuuYSb8
xjgb0ntbOg8VOoI5FX5o8dWRAmJu7SXDbnKNvpTgPfFl0Gb2spgGsX5aINGLD8iS
h5SerdpJYDEMvXyAl/7Mnfz0TYH8ThWStRiEkEeaucD6Uc1yBDhUl3uV/jjHjvcp
AFbaI14R/UNEypI4z0ylpH0a5tLG4CKOTAOwt68Kcs3Undbqbp8FvIUqD2Iy6fXF
EtdF329mjgcaa7iDYnt2BXPvkRvthla+98flmjD9okzhM69x2t0Ubg==
=JdW9
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close