Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Mac OS X Security Update Fixes Multiple Vulnerabilities

-

Release Date:  2007-03-14    Last Update:  2007-03-16    Views:  24,043

Secunia Advisory SA24479

Where:

From remote

Impact:

Security Bypass, Cross Site Scripting, Manipulation of data, Exposure of sensitive information, Privilege escalation, DoS, System access

Solution Status:

Vendor Patch

Operating System:

CVE Reference(s):

Description


Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

1) A boundary error exists in the handling of embedded ColorSync profiles. This can be exploited by malicious people to cause a stack based buffer overflow by enticing a user to open a specially crafted image.

Successful exploitation may allow execution of arbitrary code.

2) An error in Crash Reporter can be exploited by a process with admin privileges to write to arbitrary files with root privileges.

3) An unspecified error in CUPS can be exploited to prevent other requests from being served via a partially negotiated SSL connection.

4) An unspecified error in diskimages-helper can be exploited by malicious people to cause a memory corruption via a specially crafted disk image and may allow execution of arbitrary code.

5) An integer overflow in the handler for AppleSingleEncoding disk images can potentially be exploited by malicious people to execute arbitrary code by tricking a user to mount a specially crafted disk image.

6) Various errors exist in the processing of disk images, which can be exploited to gain escalated privileges, cause a DoS (Denial of Service), or to compromise a user's system.

For more information:
SA22736
SA23012
SA23703
SA23721
SA23725

7) An unspecified error in DS Plug-Ins can be exploited by malicious users to change the local root password.

8) An error in Flash Player can be exploited by malicious people to bypass certain restrictions.

For more information:
SA22467

9) Multiple errors in GNU Tar can be exploited by malicious people to cause a DoS, overwrite arbitrary files, or to compromise a vulnerable system.

For more information:
SA18973
SA23115

10) An error in the handling of HFS+ file systems can be exploited by malicious people to cause a DoS.

For more information:
SA23742

11) An error in the IOKit HID interface can be exploited by malicious, local users to capture console keystrokes from other users.

12) An integer overflow error in the handling of GIF files in ImageIO can potentially be exploited by malicious people to execute arbitrary code by tricking a users to open a specially crafted GIF file.

NOTE: Systems prior to Mac OS X v10.4 are not affected.

13) An error in the handling of RAW images can be exploited by malicious people to cause a memory corruption and may allow execution of arbitrary code by tricking a user to open a specially crafted RAW image.

NOTE: Systems prior to Mac OS X v10.4 are not affected.

14) An error in the kernel can be exploited by malicious, local users to cause a DoS.

For more information:
SA22808

15) An error in the kernel can be exploited by malicious, local users to cause a DoS or potentially gain escalated privileges.

For more information:
SA23088

16) An error in the kernel can be exploited by malicious, local users to gain escalated privileges.

For more information:
SA23120

17) Some vulnerabilities in MySQL can be exploited by malicious users to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS, and compromise a vulnerable system, and by malicious people to conduct SQL injection attacks

For more information:
SA19929
SA20365
SA21259
SA21506

18) Errors in the AppleTalk protocol handler can be exploited by malicious, local users to cause a DoS or potentially gain escalated privileges.

For more information:
SA23134
SA23708

19) An error in the handling of SSH key generation in OpenSSH can be exploited by malicious people to destroy established trust between SSH hosts. Systems that have already enabled SSH and rebooted at least once are not vulnerable to this issue.

20) Errors in OpenSSH can be exploited by malicious, local users to perform certain actions with escalated privileges, and by malicious people to cause a DoS or potentially compromise a vulnerable system.

For more information:
SA18579
SA22091
SA22173

21) An error in the print system can be exploited by malicious, local users to overwrite arbitrary files with system privileges.

22) An error in Apple QuickDraw can be exploited by malicious people to cause a heap based buffer overflow and may allow execution of arbitrary code via a specially crafted PICT file.

23) An error in Apple QuickDraw can be exploited by malicious people to cause a DoS.

For more information:
SA23859

24) An error in servermgrd can be exploited by malicious people to access Server Manager without valid credentials

25) A boundary error in SMB File Server can be exploited by malicious users to cause stack based buffer overflow, which results in a DoS or potentially in arbitrary code execution.

26) A format string error in Software Update can be exploited by malicious people to execute arbitrary code by tricking a user to open a specially crafted Software Update Catalog.

27) An error in sudo can be exploited by malicious, local users to gain escalated privileges.

For more information:
SA17318

28) An error in WebLog can be exploited by malicious people to conduct cross-site scripting attacks.

For more information:
SA21935


Solution:
Update to Mac OS X 10.4.9 or install Security Update 2007-003:

Further details available to Secunia VIM customers

Provided and/or discovered by:
The vendor credits:

1, 12) Tom Ferris, Security-Protocols
2) KF
11) Andrew Garber of University of Victoria, Alex Harper, and Michael Evans
13) Luke Church, University of Cambridge
19) Jeff Mccune, The Ohio State University
22) Tom Ferris, Security-Protocols and Mike Price, McAfee AVERT Labs
25) Cameron Kay of Massey University, New Zealand
26) Kevin Finisterre, DigitalMunition

Original Advisory:
Apple:
http://docs.info.apple.com/article.html?artnum=305214

MOAB:
2) http://projects.info-pull.com/moab/MOAB-28-01-2007.html
26) http://projects.info-pull.com/moab/MOAB-24-01-2007.html

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Mac OS X Security Update Fixes Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability