Apple has issued a security update for Mac OS X, which fixes some older, known vulnerabilities along with some new unspecified issues.
Boundary errors in the Apache "mod_alias" and "mod_rewrite" modules can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. Furthermore, the AF_UNIX socket used by "mod_cgid" to communicate with the cgid daemon or CGI script is not handled properly.
An unspecified vulnerability in the SystemConfiguration subsystem has also been fixed. This could reportedly be exploited by remote non-admin users to change network settings and make configuration changes to configd.
A boundary error in TruBlueEnvironment can be exploited by malicious, local users to gain "root" privileges. The problem is that values of environment variables are copied without performing any bounds checking, which may result in a buffer overflow.
Unspecified vulnerabilities in Apple's mail application, the Safari web browser, and in Windows File Sharing have also been fixed.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Mac OS X Security Update Fixes Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.