exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2005-229A

Technical Cyber Security Alert 2005-229A
Posted Aug 18, 2005
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA05-229A - Apple has released Security Update 2005-007 to address multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser, and other products. The most serious of these vulnerabilities may allow a remote attacker to execute arbitrary code. Impacts of other vulnerabilities include bypassing security restrictions and denial of service.

tags | advisory, remote, web, denial of service, arbitrary, vulnerability
systems | apple, osx
SHA-256 | 2172d753fb743f6dde9c566d2e0a4c43f1944304734a8f0c8be9e13956e77cc3

Technical Cyber Security Alert 2005-229A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


National Cyber Alert System

Technical Cyber Security Alert TA05-229A


Apple Mac Products are Affected by Multiple Vulnerabilities

Original release date: August 17, 2005
Last revised: --
Source: US-CERT


Systems Affected

* Apple Mac OS X version 10.3.9 (Panther) and version 10.4.2 (Tiger)
* Apple Mac OS X Server version 10.3.9 and version 10.4.2
* Apple Safari web browser

Please see Apple Security Update 2005-007 for further information.


Overview

Apple has released Security Update 2005-007 to address multiple
vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web
browser, and other products. The most serious of these vulnerabilities
may allow a remote attacker to execute arbitrary code. Impacts of
other vulnerabilities include bypassing security restrictions and
denial of service.


I. Description

Apple Security Update 2005-007 resolves a number of vulnerabilities
affecting Mac OS X, OS X Server, Safari web browser, and other
products. Further details are available in the following Vulnerability
Notes:

VU#913820 - Apple Mac OS X Directory Services contains a buffer
overflow

A buffer overflow in Apple Mac OS X Directory Service's authentication
process may allow a remote, unauthenticated attacker to execute
arbitrary code on a vulnerable system.
(CAN-2005-2507)

VU#461412 - Apple Mac OS X Server servermgrd authentication vulnerable
to buffer overflow

Apple Mac OS X Server servermgrd contains an unspecified buffer
overflow vulnerability in its authentication handling routines. This
vulnerability may lead to remote execution of arbitrary code.
(CAN-2005-2518)

VU#435188 - Apple Mac OS X AppKit vulnerable to buffer overflow via
the handling of maliciously crafted rich text files

A buffer overflow vulnerability exists in a component of Apple's Mac
OS X operating system that handles rich text files.
(CAN-2005-2501)

VU#172948 - Apple Mac OS X AppKit vulnerable to buffer overflow via
maliciously crafted Microsoft Word files

A buffer overflow vulnerability exists in a component of Apple's Mac
OS X operating system that handles Microsoft Word files.
(CAN-2005-2502)

VU#420316 - Apple Mac OS X Safari vulnerable to arbitrary command
execution via URLs in PDF files

Apple Mac OS X WebKit and Safari security controls may be bypassed,
possibly allowing remote command execution.
(CAN-2005-2522)

VU#709220 - Apple Safari fails to perform security checks on links in
rich text content

Apple Safari fails to perform security checks on hyperlinks in rich
text content, which may allow an attacker to execute arbitrary
commands on a vulnerable system.
(CAN-2005-2516)

Please note that Apple Security Update 2005-007 addresses
additional vulnerabilities not described above. As further
information becomes available, we will publish individual
Vulnerability Notes.


II. Impact

The impacts of these vulnerabilities vary. For information about
specific impacts please see the Vulnerability Notes. Potential
consequences include remote execution of arbitrary code or commands,
bypass of security restrictions, and denial of service.


III. Solution

Install an update

Install the update as described in Apple Security Update 2005-007. In
addition, this update is available via Apple Update.


Appendix A. References

* US-CERT Vulnerability Note VU#913820 -
<http://www.kb.cert.org/vuls/id/913820>

* US-CERT Vulnerability Note VU#461412 -
<http://www.kb.cert.org/vuls/id/461412>

* US-CERT Vulnerability Note VU#435188 -
<http://www.kb.cert.org/vuls/id/435188>

* US-CERT Vulnerability Note VU#172948 -
<http://www.kb.cert.org/vuls/id/172948>

* US-CERT Vulnerability Note VU#420316 -
<http://www.kb.cert.org/vuls/id/420316>

* US-CERT Vulnerability Note VU#709220 -
<http://www.kb.cert.org/vuls/id/709220>

* Apple Security Update 2005-007 -
<http://docs.info.apple.com/article.html?artnum=302163>

* Mac OS X: Updating your software -
<http://docs.info.apple.com/article.html?artnum=106704>


____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA05-229A.html>
____________________________________________________________________

Feedback can be directed to US-CERT. Please send email to
<cert@cert.org> with "TA05-229A Feedback VU#913820" in the subject.
____________________________________________________________________

Mailing list information:

<http://www.us-cert.gov/cas/>
____________________________________________________________________

Produced 2005 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>
____________________________________________________________________


Revision History

August 17, 2005: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQwOKkRhoSezw4YfQAQLxywgAkWTcoA3KoWAiY5YYPGejCVbWw/yFzAqy
4Fb0z9WXfwhwB3/L/IxLvJGhPdVF/b6buP/KZgIxalwsRu6GPjJp5Aj+Cbtf/8KI
2ca0bRxS3vZJS52ZOEVpS2Z2M8JdcBA2CgfvIw6GEklXD9MTjXXwYUhB6tYK4Ar0
+UAk6xxaaMRvKztOYbRZhy5/5Kz2Xd9a5UwO/hbojQmilv4elW3iZhGWP+nLEpSI
D680yttkY++UzmYGYHO0Wm+SAK4fzXKxs/4PMfWvNgP8lKJsHXjjr7KLFtmgCiWU
oxhOB8RdqVNTKE2kYEq1kiopusBtwK/x35VNr3uCjg23CxYuv8HAjw==
=yJpi
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close