[SA22187] Mac OS X Security Update Fixes Multiple Vulnerabilities

Type securityvulns
Reporter Securityvulns
Modified 2006-10-02T00:00:00


TITLE: Mac OS X Security Update Fixes Multiple Vulnerabilities


VERIFY ADVISORY: http://secunia.com/advisories/22187/

CRITICAL: Highly critical

IMPACT: Security Bypass, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access

WHERE: >From remote

OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/

DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

1) An error in the CFNetwork component may allow a malicious SSL site to pose as a trusted SLL site to CFNetwork clients (e.g. Safari).

2) Various errors in the Flash Player can be exploited by malicious people to bypass security restrictions and compromise a vulnerable system.

For more information: SA20971 SA21865

3) A boundary error in the ImageIO component when processing JPEG2000 images can be exploited to cause a buffer overflow and may allow execution of arbitrary code.

4) An error in the kernel's error handling mechanism known as Mach exception ports can be exploited by malicious, local users to execute arbitrary code in privileged applications.

5) An unchecked error condition in the LoginWindow component may result in Kerberos tickets being accessible to other local users after an unsuccessful attempt to log in.

6) Another error in the LoginWindow component during the handling of "Fast User Switching" may result in Kerberos tickets being accessible to other local users.

7) A logic error in the LoginWindow component may allow network accounts without GUIDs to bypass the LoginWindow service access controls.

8) An error makes it possible for an account to manage WebObjects applications after the "Admin" privileges have been revoked.

9) A memory corruption error in QuickDraw Manager when processing PICT images can potentially be exploited via a specially crafted PICT image to execute arbitrary code.

10) An error in SASL can be exploited by malicious people to cause a DoS (Denial of Service) against the IMAP service.

For more information: SA19618

11) A memory management error in WebKit's handling of certain HTML can be exploited by malicious people to compromise a user's system.

For more information: SA21271

12) An error in Workgroup Manager may result in accounts in a NetInfo parent to use crypt even though they appear to use ShadowHash passwords.

SOLUTION: Update to version 10.4.8 or apply Security Update 2006-006.

Mac OS X 10.4.8 Update (Intel): http://www.apple.com/support/downloads/macosx1048updateintel.html

Security Update 2006-006 (10.3.9 Client): http://www.apple.com/support/downloads/securityupdate20060061039client.html

Security Update 2006-006 (10.3.9 Server): http://www.apple.com/support/downloads/securityupdate20060061039server.html

Mac OS X 10.4.8 Update (PPC): http://www.apple.com/support/downloads/macosx1048updateppc.html

Mac OS X 10.4.8 Combo Update (PPC): http://www.apple.com/support/downloads/macosx1048comboupdateppc.html

Mac OS X 10.4.8 Combo Update (Intel): http://www.apple.com/support/downloads/macosx1048comboupdateintel.html

Mac OS X Server 10.4.8 Update (PPC): http://www.apple.com/support/downloads/macosxserver1048updateppc.html

Mac OS X Server 10.4.8 Combo Update (PPC): http://www.apple.com/support/downloads/macosxserver1048comboupdateppc.html

Mac OS X Server 10.4.8 Update (Universal): http://www.apple.com/support/downloads/macosxserver1048updateuniversal.html

PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Adam Bryzak, Queensland University of Technology. 3) The vendor credits Tom Saxton, Idle Loop Software Design. 4) The vendor credits Dino Dai Zovi, Matasano Security. 5) The vendor credits Patrick Gallagher, Digital Peaks Corporation. 6) The vendor credits Ragnar Sundblad, Royal Institute of Technology. 8) The vendor credits Phillip Tejada, Fruit Bat Software. 12) The vendor credits Chris Pepper, The Rockefeller University.

ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=304460

OTHER REFERENCES: SA19618: http://secunia.com/advisories/19618/

SA20971: http://secunia.com/advisories/20971/

SA21271: http://secunia.com/advisories/21271/

SA21865: http://secunia.com/advisories/21865/

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.