Secunia Advisory: SA28891
Release Date: 2008-02-12
Last Update: 2008-02-13
Critical: Highly critical
Impact: Security Bypass
Exposure of system information
Privilege escalation
DoS
System access
Where: From remote
Solution Status: Vendor Patch
OS: Apple Macintosh OS X
CVE reference:
CVE-2007-4568 (Secunia mirror)
CVE-2007-6015 (Secunia mirror)
CVE-2008-0035 (Secunia mirror)
CVE-2008-0037 (Secunia mirror)
CVE-2008-0038 (Secunia mirror)
CVE-2008-0039 (Secunia mirror)
CVE-2008-0040 (Secunia mirror)
CVE-2008-0041 (Secunia mirror)
CVE-2008-0042 (Secunia mirror)
Description:
Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities and weaknesses.
1) An unspecified error exists within Foundation in Safari's handling of URLs. This can be exploited to cause a memory corruption when a user is enticed to access a specially crafted URL.
Successful exploitation may allow execution of arbitrary code.
2) A weakness exists due to Launch Services allowing users to start uninstalled applications from a Time Machine Backup.
3) An error in the handling of file:// URLs in Mail can be exploited to execute arbitrary applications without warning when a user is enticed to click on a URL within a message.
4) An unspecified error exists within NFS when handling mbuf chains. This can be exploited to cause a memory corruption and allows a system shutdown and potential execution of arbitrary code.
5) The problem is that Parental Controls contacts www.apple.com when a site is unblocked and allows for detection of computers running Parental Controls.
6) A boundary error in Samba can be exploited by malicious people to compromise a vulnerable system.
For more information:
SA27760
7) An input validation error exists in Terminal when processing URL schemes. This can be exploited to launch an application with arbitrary command line parameters and may allow execution of arbitrary code when a user visits a specially crafted web page.
8) Multiple vulnerabilities in X11 X Font Server can be exploited by malicious, local users to gain escalated privileges.
For more information:
SA27040
9) An error exists in X11, which causes certain settings ("Allow connections from network client") not to be applied.
Solution:
Update to Mac OS X 10.5.2 or apply Security Update 2008-001.
Bollettino Secunia
Release Date: 2008-02-12
Last Update: 2008-02-13
Critical: Highly critical
Impact: Security Bypass
Exposure of system information
Privilege escalation
DoS
System access
Where: From remote
Solution Status: Vendor Patch
OS: Apple Macintosh OS X
CVE reference:
CVE-2007-4568 (Secunia mirror)
CVE-2007-6015 (Secunia mirror)
CVE-2008-0035 (Secunia mirror)
CVE-2008-0037 (Secunia mirror)
CVE-2008-0038 (Secunia mirror)
CVE-2008-0039 (Secunia mirror)
CVE-2008-0040 (Secunia mirror)
CVE-2008-0041 (Secunia mirror)
CVE-2008-0042 (Secunia mirror)
Description:
Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities and weaknesses.
1) An unspecified error exists within Foundation in Safari's handling of URLs. This can be exploited to cause a memory corruption when a user is enticed to access a specially crafted URL.
Successful exploitation may allow execution of arbitrary code.
2) A weakness exists due to Launch Services allowing users to start uninstalled applications from a Time Machine Backup.
3) An error in the handling of file:// URLs in Mail can be exploited to execute arbitrary applications without warning when a user is enticed to click on a URL within a message.
4) An unspecified error exists within NFS when handling mbuf chains. This can be exploited to cause a memory corruption and allows a system shutdown and potential execution of arbitrary code.
5) The problem is that Parental Controls contacts www.apple.com when a site is unblocked and allows for detection of computers running Parental Controls.
6) A boundary error in Samba can be exploited by malicious people to compromise a vulnerable system.
For more information:
SA27760
7) An input validation error exists in Terminal when processing URL schemes. This can be exploited to launch an application with arbitrary command line parameters and may allow execution of arbitrary code when a user visits a specially crafted web page.
8) Multiple vulnerabilities in X11 X Font Server can be exploited by malicious, local users to gain escalated privileges.
For more information:
SA27040
9) An error exists in X11, which causes certain settings ("Allow connections from network client") not to be applied.
Solution:
Update to Mac OS X 10.5.2 or apply Security Update 2008-001.
Bollettino Secunia