what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Apple Security Advisory 2005-10-31

Apple Security Advisory 2005-10-31
Posted Nov 1, 2005
Authored by Apple | Site docs.info.apple.com

Flaws for Finder, Software Update, memberd, Keychain, and the kernel have all been addressed in this latest Apple update.

tags | advisory, kernel
systems | apple
advisories | CVE-2005-2749, CVE-2005-2750, CVE-2005-2751, CVE-2005-2739, CVE-2005-1126, CVE-2005-1406, CVE-2005-2752
SHA-256 | 2c633f5d3e2fe72b1fff28459607162165bb542d1f00be4465e76886d8aa7a66

Apple Security Advisory 2005-10-31

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2005-10-31 Mac OS X v10.4.3

Mac OS X v10.4.3 and Mac OS X Server v10.4.3 are now available and
deliver the following security enhancements:

Finder
CVE-ID: CVE-2005-2749
Available for: Mac OS X v10.4.2, Mac OS X Server v10.4.2
Impact: File ownership information may be misleading
Description: Under certain situations, the file and group ownership
information displayed in the Finder Get Info window may not be
correct. This update addresses the issue by synchronizing the
displayed ownership with the actual ownership in all situations.
This issue does not affect systems prior to Mac OS X v10.4.

Software Update
CVE-ID: CVE-2005-2750
Available for: Mac OS X v10.4.2, Mac OS X Server v10.4.2
Impact: Important Software Updates may not install
Description: Software Update can be instructed by the user to
ignore specific updates. If all applicable updates have been marked
in this way, Software Update will exit without providing an an
opportunity to reset the status of these updates so that they may
be installed. This update addresses the issue by asking whether the
ignored updates list should be reset when this situation is
encountered. This issue does not affect systems prior to Mac OS X
v10.4.

memberd
CVE-ID: CVE-2005-2751
Available for: Mac OS X Server v10.4.2
Impact: Changes to group membership are delayed for hours
Description: In certain situations, changes to a group's membership
may not be immediately reflected in access control checks. This may
result in an authenticated user being able to access files or other
resources even after they have been removed from a group. This
update addresses the issue by invalidating the group membership
cache at appropriate times. This issue does not affect systems
prior to Mac OS X v10.4.

Keychain
CVE-ID: CVE-2005-2739
Available for: Mac OS X v10.4.2, Mac OS X Server v10.4.2
Impact: Keychain Access will continue displaying plaintext
passwords after lock timeout
Description: Keychain Access is a utility distributed with Mac OS X
that is used to view keychain items and change keychain settings.
If a keychain automatically locks due to a timeout while viewing a
password stored inside it, that password will remain visible. This
update patches Keychain Access so that passwords are hidden when
keychains lock. This issue does not affect systems prior to Mac OS
X v10.4. Credit to Eric Hall of DarkArt Consulting Services for
reporting this issue.

Kernel
CVE-ID: CVE-2005-1126, CVE-2005-1406, CVE-2005-2752
Available for: Mac OS X v10.4.2, Mac OS X Server v10.4.2
Impact: Kernel memory may be disclosed to local users
Description: Certain kernel interfaces may return data that
includes sensitive information in uninitialized memory. These
issues affect Mac OS X v10.4.2 and earlier. Credit to Ilja van
Sprundel and Neil Archibald of Suresec LTD, and Colin Percival of
the FreeBSD team for reporting these issues.

Mac OS X v10.4.3 may be obtained from the Software Update pane in
System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

For Mac OS X v10.4.2
The download file is named: "MacOSXUpdate10.4.3.dmg"
Its SHA-1 digest is: d5f641c111621705dd0da4ecdd733a1f47c576a3

For Mac OS X v10.4 and Mac OS X v10.4.1
The download file is named: "MacOSXUpdateCombo10.4.3.dmg"
Its SHA-1 digest is: 1264c6c4583aa163a6e8465fbad7d0ff58b32086

For Mac OS X Server v10.4.2
The download file is named: "MacOSXServerUpdate10.4.3.dmg"
Its SHA-1 digest is: a2cea3387079e92618b02196e7683c85377d512f

For Mac OS X Server v10.4 and Mac OS X Server v10.4.1
The download file is named: "MacOSXSrvrUpdCombo10.4.3.dmg"
Its SHA-1 digest is: 6dbc793d6613861d7e1954c477f11215db1bb569

Information will also be posted to the Apple Product Security
web site: http://docs.info.apple.com/article.html?artnum=61798

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.2 (Build 2425)

iQEVAwUBQ2aaL4HaV5ucd/HdAQJ+Hgf/efHQVD9Kbi3pAwoZQna3jk5tp7kqFSfS
6/MgxTz8b8AhYQAReuKQpK4uQEc2Zy3lgWOLwaaPFcfX2wunKR3we27DSUK0Nmyz
KhHf0Rr7bAnDd8kcU6DnRQEQgKb2PNZ0D6Va5Q3/19e/wFE6hI2Tm3aW7vyKPiQo
KnstC0s6KT3J2bPeaXWEJH3RTqEa5ki1sO6gDejsO9Ym4niAvSNNYooa3f/afUYU
MQqgOuXSQqKiBWQiijMrJz5ytix1jTGplkr4pEppYnfqHxTtKGY5MjXmjfX8luM9
Dj3D+bRqVQHZ6YfY9f7fKx/5rRZDXxTViHCISPh6466QJzxf26GPvg==
=EDGT
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close