From Secunia:
Description:
Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.1) A format string error in the URL handler of Address Book can be exploited to execute arbitrary code when a user views a specially crafted web page.
2) An error in the handling of downloaded files in CFNetwork can be exploited via directory traversal attacks to automatically download files to arbitrary folders when a user is enticed to visit a specially crafted web page.
3) An unspecified error exists in ColorSync when processing images with an embedded ColorSync profile, which can be exploited to cause a memory corruption.
Successful exploitation may allow execution of arbitrary code.
4) A race condition exists in the “CFURLWriteDataAndPropertiesToResource” API, which can lead to files being created with insecure permissions.
5) A boundary error exists in the printer driver for CUPS. This can be exploited to cause a buffer overflow and allows an admin user to execute arbitrary code with system privileges by passing a specially crafted URI to the CUPS service.
And the list goes on. For the full listing of the patches for Tiger and Leopard please follow the link below.
[tags]Apple Security, OS X Security, Apple Patches, Apple OS X Security[/tags]