Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Mac OS X Security Update Fixes Multiple Vulnerabilities

-

Release Date:  2006-09-29    Last Update:  2006-10-03    Views:  21,290

Secunia Advisory SA22187

Where:

From remote

Impact:

Security Bypass, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access

Solution Status:

Vendor Patch

Operating System:

CVE Reference(s):

Description


Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

1) An error in the CFNetwork component may allow a malicious SSL site to pose as a trusted SLL site to CFNetwork clients (e.g. Safari).

2) Various errors in the Flash Player can be exploited by malicious people to bypass security restrictions and compromise a vulnerable system.

For more information:
SA20971
SA21865

3) A boundary error in the ImageIO component when processing JPEG2000 images can be exploited to cause a buffer overflow and may allow execution of arbitrary code.

4) An error in the kernel's error handling mechanism known as Mach exception ports can be exploited by malicious, local users to execute arbitrary code in privileged applications.

5) An unchecked error condition in the LoginWindow component may result in Kerberos tickets being accessible to other local users after an unsuccessful attempt to log in.

6) Another error in the LoginWindow component during the handling of "Fast User Switching" may result in Kerberos tickets being accessible to other local users.

7) A logic error in the LoginWindow component may allow network accounts without GUIDs to bypass the LoginWindow service access controls.

8) An error makes it possible for an account to manage WebObjects applications after the "Admin" privileges have been revoked.

9) A memory corruption error in QuickDraw Manager when processing PICT images can potentially be exploited via a specially crafted PICT image to execute arbitrary code.

10) An error in SASL can be exploited by malicious people to cause a DoS (Denial of Service) against the IMAP service.

For more information:
SA19618

11) A memory management error in WebKit's handling of certain HTML can be exploited by malicious people to compromise a user's system.

For more information:
SA21271

12) An error in Workgroup Manager may result in accounts in a NetInfo parent to use crypt even though they appear to use ShadowHash passwords.


Solution:
Update to version 10.4.8 or apply Security Update 2006-006.

Further details available to Secunia VIM customers

Provided and/or discovered by:
1) The vendor credits Adam Bryzak, Queensland University of Technology.
3) The vendor credits Tom Saxton, Idle Loop Software Design.
4) The vendor credits Dino Dai Zovi, Matasano Security.
5) The vendor credits Patrick Gallagher, Digital Peaks Corporation.
6) The vendor credits Ragnar Sundblad, Royal Institute of Technology.
8) The vendor credits Phillip Tejada, Fruit Bat Software.
12) The vendor credits Chris Pepper, The Rockefeller University.

Original Advisory:
Apple:
http://docs.info.apple.com/article.html?artnum=304460

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Mac OS X Security Update Fixes Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability