Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

-

Release Date:  2009-05-13    Last Update:  2009-06-09    Views:  12,593

Secunia Advisory SA35074

Where:

From remote

Impact:

Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access

Solution Status:

Vendor Patch

Operating System:

CVE Reference(s):

Description


Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

1) A vulnerability in Apache when handling FTP proxy requests can be exploited by malicious people to conduct cross-site scripting attacks.

For more information:
SA31384

2) A boundary error when parsing internal dictionaries in Compact Font Format (CFF) fonts in Apple Type Services can be exploited to cause a heap-based buffer overflow when specially crafted document is downloaded or viewed.

Successful exploitation allows execution of arbitrary code.

3) A vulnerability in BIND can potentially be exploited by malicious people to conduct spoofing attacks.

For more information:
SA33404

4) An error in the parsing of Set-Cookie headers in CFNetwork can result in applications using CFNetwork sending sensitive information in unencrypted HTTP requests.

5) An error in CFNetwork when processing long HTTP headers can be exploited to cause a heap-based buffer overflow when visiting a malicious web site.

Successful exploitation allows execution of arbitrary code.

6) Multiple errors exist in the processing of PDF files in CoreGraphics, which can be exploited to corrupt memory and execute arbitrary code via a specially crafted PDF file.

7) An integer underflow error in the processing of PDF files in CoreGraphics can be exploited to cause a heap-based buffer overflow when specially crafted PDF files is opened.

Successful exploitation allows execution of arbitrary code.

8) Multiple vulnerabilities in the processing of JBIG2 streams within PDF files in CoreGraphics can be exploited by malicious people to compromise a user's system.

For more information:
SA34291

9) Multiple vulnerabilities in cscope can be exploited by malicious people to compromise a user's system.

For more information:
SA34978:

10) A boundary error in the handling of disk images can be exploited to cause a stack-based buffer overflow when a specially crafted disk image is mounted.

11) Multiple unspecified errors in the handling of disk images can be exploited to cause memory corruptions when a specially crafted disk image is mounted.

Successful exploitation of vulnerabilities #10 and #11 allows execution of arbitrary code.

12) Multiple vulnerabilities in enscript can be exploited by malicious people to compromise a vulnerable system.

For more information:
SA13968
SA32137

13) Multiple vulnerabilities in the Flash Player plugin can be exploited by malicious people to compromise a user's system.

For more information:
SA34012

14) An error in Help Viewer when loading Cascading Style Sheets referenced in URL parameters can be exploited to invoke arbitrary AppleScript files.

15) A vulnerability exists due to Help Viewer not validating that full paths to HTML documents are within registered help books, which can be exploited to invoke arbitrary AppleScript files.

Successful exploitation of vulnerabilities #14 and #15 allows execution of arbitrary code.

16) An error in iChat can result in AIM communication configured for SSL to be sent in plaintext.

17) An error in the handling of certain character encodings in ICU can be exploited to bypass filters on websites that attempt to mitigate cross-site scripting.

18) Some vulnerabilities in IPSec can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

For more information:
SA31450
SA31478

19) Multiple vulnerabilities in Kerberos can be exploited by malicious people to potentially disclose sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.

For more information:
SA34347

20) An error in the handling of workqueues within the kernel can be exploited by malicious, local users to cause a DoS or execute arbitrary code with Kernel privileges.

21) An error in Launch Services can cause Finder to repeatedly terminate and relaunch when a specially crafted Mach-O is downloaded.

22) A vulnerability in libxml can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

For more information:
SA31558

23) A vulnerability in Net-SNMP can be exploited by malicious people to cause a DoS (Denial of Service).

For more information:
SA32560

24) A vulnerability in Network Time can be exploited by malicious people to conduct spoofing attacks.

For more information:
SA33406

25) A vulnerability in Network Time can be exploited by malicious people to potentially compromise a user's system.

For more information:
SA34608

26) A vulnerability in Networking can be exploited by malicious people to cause a DoS (Denial of Service).

For more information:
SA31745

27) A vulnerability in OpenSSL can be exploited by malicious people to conduct spoofing attacks.

For more information:
SA33338

28) Some vulnerabilities in PHP can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system, and by malicious, local users to bypass certain security restrictions.

For more information:
SA32964

29) An unspecified error in QuickDraw Manager can be exploited to cause a memory corruption and potentially execute arbitrary code via a specially crafted PICT image.

30) An integer underflow error in the handling of "0x77" tags within PICT images in QuickDraw Manager can be exploited to cause a heap-based buffer overflow via a specially crafted PICT file.

Successful exploitation allows execution of arbitrary code.

31) Multiple vulnerabilities in ruby can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and conduct spoofing attacks.

For more information:
SA31430
SA31602

32) An error in the use of the OpenSSL library in ruby can cause revoked certificates to be accepted.

33) A vulnerability in Safari when handling "feed:" URLs can be exploited to compromise a user's system.

For more information:
SA35056

34) Multiple unspecified errors in Spotlight can be exploited to cause memory corruptions and execute arbitrary code when a specially crafted Office document is downloaded.

35) An error when invoking the "login" command can result in unexpected high privileges.

36) A boundary error in telnet can be exploited to cause a stack-based buffer overflow when connecting to a server with an overly long canonical name in its DNS address record.

Successful exploitation may allow execution of arbitrary code.

37) A vulnerability in WebKit when handling SVGList objects can be exploited to corrupt memory and potentially execute arbitrary code.

For more information:
SA35056

38) Multiple vulnerabilities in FreeType can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise applications using the library.

For more information:
SA20100
SA25350
SA34723

39) A vulnerability in xterm can be exploited by malicious people to compromise a user's system.

For more information:
SA33318

40) Multiple vulnerabilities in libpng can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library.

For more information:
SA29792
SA33970

41) An integer overflow in xterm when handling negative size values can be exploited to cause a memory corruption via specially crafted "CSI[4" window resizing escape codes.


Solution:
Update to Mac OS X v10.5.7 or apply Security Update 2009-002.

Further details available to Secunia VIM customers

Provided and/or discovered by:
2) Charlie Miller of Independent Security Evaluators, reported via ZDI
5) Moritz Jodeit, n.runs AG
20) Neil Kettle (mu-b), reported via iDefense
30) Damian Put and Sebastian Apelt, reported via ZDI
41) Rob King, TippingPoint DVLabs

The vendor credits:
4) Andrew Mortensen of the University of Michigan
7) Barry K. Nathan
8) Alin Rad Pop, Secunia Research and Will Dormann, CERT/CC
10) Tiller Beauchamp, IOActive
14, 15) Brian Mastenbrook
17) Chris Weber of Casaba Security
30) The vendor also credits Chris Ries of Carnegie Mellon University Computing Services
38) Tavis Ormandy of the Google Security Team

Original Advisory:
Apple:
http://support.apple.com/kb/HT3549

iDefense:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=797

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-09-021/
http://www.zerodayinitiative.com/advisories/ZDI-09-023/

Moritz Jodeit, n.runs AG:
http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0130.html

TippingPoint DVLabs:
http://dvlabs.tippingpoint.com/advisory/TPTI-09-04

Neil Kettle:
http://digit-labs.org/files/exploits/xnu-workq-v2-64.c

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability