Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Mac OS X Security Update Fixes Multiple Vulnerabilities

-

Release Date:  2004-10-05    Views:  19,794

Secunia Advisory SA12690

Where:

From remote

Impact:

Security Bypass, Exposure of system information, Exposure of sensitive information, DoS, System access

Solution Status:

Vendor Patch

Operating System:

CVE Reference(s):

Description


Apple has issued a security update for Mac OS X, which fixes various vulnerabilities.

1) A vulnerability in the AFP Server can be exploited by guest users to disconnect AFP volumes by sending specially crafted SessionDestroy packets.

The vulnerability does reportedly not affect versions prior to 10.3.

2) A security issue in the AFP Server can be exploited to change the permissions of a write-only AFP drop box to read-write due to an incorrect setting of the guest group id.

This problem does reportedly not affect versions prior to 10.3.

3) A vulnerability in CUPS can be exploited by malicious people to cause a DoS (Denial of Service).

For more information:
SA12556

4) A vulnerability in CUPS within certain methods of authenticated remote printing can be exploited to disclose users' passwords in the log files.

5) A security issue in the NetInfo Manager utility may result in an incorrect indication of the "root" account being disabled.

This problem does reportedly not affect versions prior to 10.3.

6) A security issue in postfix with "SMTPD AUTH" enabled may result in only users with the longest usernames being able to authenticate.

This problem does reportedly not affect versions prior to 10.3.

7) A vulnerability in QuickTime can potentially be exploited to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of BMP images.

8) ServerAdmin comes with a self signed default certificate used for encrypted communication. However, this certificate is the same on all systems and it is therefore possible to decrypt and read captured sessions if this certificate is used.


Solution:
Apply Security Update 2004-09-30.

Further details available to Secunia VIM customers

Provided and/or discovered by:
4) Gary Smith
6) Michael Rondinelli

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Mac OS X Security Update Fixes Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability