Secunia CSI7
Create Profile
Our Commitment
Advisories by Product
Advisories by Vendor
Report Vulnerability
Insecure Library Loading
Highly critical

Mac OS X Security Update Fixes Multiple Vulnerabilities


Release Date:  2006-09-29    Last Update:  2006-10-03    Views:  21,290

Secunia Advisory SA22187


From remote


Security Bypass, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access

Solution Status:

Vendor Patch

Operating System:

CVE Reference(s):


Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

1) An error in the CFNetwork component may allow a malicious SSL site to pose as a trusted SLL site to CFNetwork clients (e.g. Safari).

2) Various errors in the Flash Player can be exploited by malicious people to bypass security restrictions and compromise a vulnerable system.

For more information:

3) A boundary error in the ImageIO component when processing JPEG2000 images can be exploited to cause a buffer overflow and may allow execution of arbitrary code.

4) An error in the kernel's error handling mechanism known as Mach exception ports can be exploited by malicious, local users to execute arbitrary code in privileged applications.

5) An unchecked error condition in the LoginWindow component may result in Kerberos tickets being accessible to other local users after an unsuccessful attempt to log in.

6) Another error in the LoginWindow component during the handling of "Fast User Switching" may result in Kerberos tickets being accessible to other local users.

7) A logic error in the LoginWindow component may allow network accounts without GUIDs to bypass the LoginWindow service access controls.

8) An error makes it possible for an account to manage WebObjects applications after the "Admin" privileges have been revoked.

9) A memory corruption error in QuickDraw Manager when processing PICT images can potentially be exploited via a specially crafted PICT image to execute arbitrary code.

10) An error in SASL can be exploited by malicious people to cause a DoS (Denial of Service) against the IMAP service.

For more information:

11) A memory management error in WebKit's handling of certain HTML can be exploited by malicious people to compromise a user's system.

For more information:

12) An error in Workgroup Manager may result in accounts in a NetInfo parent to use crypt even though they appear to use ShadowHash passwords.

Update to version 10.4.8 or apply Security Update 2006-006.

Further details available to Secunia VIM customers

Provided and/or discovered by:
1) The vendor credits Adam Bryzak, Queensland University of Technology.
3) The vendor credits Tom Saxton, Idle Loop Software Design.
4) The vendor credits Dino Dai Zovi, Matasano Security.
5) The vendor credits Patrick Gallagher, Digital Peaks Corporation.
6) The vendor credits Ragnar Sundblad, Royal Institute of Technology.
8) The vendor credits Phillip Tejada, Fruit Bat Software.
12) The vendor credits Chris Pepper, The Rockefeller University.

Original Advisory:

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to

Subject: Mac OS X Security Update Fixes Multiple Vulnerabilities

No posts yet


You must be logged in to post a comment.

 Products Solutions Customers Partner Resources Company
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
Technology Partners
 About us

© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability