Site icon Liquidmatrix Security Digest

Mac OS X Security Update Fixes Multiple Vulnerabilities

Apple has released a massive update that covers off a host of security issues. Interestingly, it comes out just before the Black Hat Briefings. Cue the conspiracy music background…heh.

From Secunia:

Description:
Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

1) An error within the handling of FTP URIs in CFNetwork can be exploited to run arbitrary FTP commands in context of the user’s FTP client, when a user is enticed to click on a specially crafted FTP URI.

2) An input validation error can cause applications using CFNetwork to become vulnerable to HTTP response splitting attacks.

3) A design error exists in the Java interface to CoreAudio, which can be exploited to free arbitrary memory, when a user is enticed to visit a web site containing a specially crafted Java applet.

4) An unspecified error exists in the Java interface to CoreAudio, which can be exploited to read or write out of bounds of the allocated heap by enticing a user to visit a web site containing a specially crafted Java applet.

5) A unspecified error exists in the Java interface to CoreAudio, which can be exploited to instantiate or manipulate objects outside the bounds of the allocated heap, when a user is enticed to visit a web site containing a specially crafted Java applet.

Successful exploitation of vulnerabilities #3 to #5 may allow arbitrary code execution.

6) Two vulnerabilities in cscope can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and by malicious people to potentially compromise a user’s system.

7) A boundary error within the UPnP IGD (Internet Gateway Device Standardized Device Control Protocol) code in iChat can be exploited on the local network to crash the application or to execute arbitrary code, by sending a specially crafted packet.

8 ) Some vulnerabilities in Kerberos can be exploited by malicious users and malicious people to compromise a vulnerable system.

9) An error within the UPnP IGD (Internet Gateway Device Standardized Device Control Protocol) code in mDNSResponder can be exploited on the local network to crash the application or to execute arbitrary code, by sending a specially crafted packet.

10) An integer underflow exists in PDFKit within the handling of PDF files in Preview and may be exploited to execute arbitrary code when a user opens a specially crafted PDF file.

11) Multiple vulnerabilities exist in PHP, which can be exploited to disclose potentially sensitive information, to cause a DoS (Denial of Service), to bypass certain security restrictions, to conduct cross-site scripting attacks, or to compromise a vulnerable system.

12) An error exists in Quartz Composer due to an uninitialized object pointer when handling Quartz Composer files and may be exploited to execute arbitrary code when a specially crafted Quartz Composer file is viewed.

13) Some vulnerabilities exist in Samba, which can be exploited by malicious people to compromise a vulnerable system.

14) An unspecified error in Samba can be exploited to bypass file system quotas.

15) Some vulnerabilities in Squirrelmail can be exploited by malicious people to disclose and manipulate certain sensitive information or to conduct cross-site scripting, cross-site request forgery, and script insertion attacks.

16) Some vulnerabilities in Apache Tomcat can be exploited by malicious people to conduct cross-site scripting attacks or to bypass certain security restrictions.

17) An error in WebCore can be exploited to load Java applets even when Java is disabled in the preferences.

18) An error in WebCore can be exploited to conduct cross-site scripting attacks.

19) An error in WebCore can be exploited by malicious people to gain knowledge of sensitive information.

20) An error in WebCore when handling properties of certain global objects can be exploited to conduct cross-site scripting attacks when navigating to a new URL with Safari.

21) An error in WebKit within in the handling of International Domain Name (IDN) support and Unicode fonts embedded in Safari can be exploited to spoof a URL.

22) A boundary error in the Perl Compatible Regular Expressions (PCRE) library in WebKit and used by the JavaScript engine in Safari can be exploited to cause a heap-based buffer overflow when a user visits a malicious web page.

23) Input validation errors exists in bzgrep and zgrep.

Article Link

[tags]Apple, Apple Security Update, Apple Security Patch[/tags]

Exit mobile version