Author Topic: Apple OS X Leopard Update Targets Safari, MobileMe  (Read 1132 times)

Offline javajolt

  • Administrator
  • Hero Member
  • *****
  • Posts: 35213
  • Gender: Male
  • I Do Windows
    • windows10newsinfo.com
Apple OS X Leopard Update Targets Safari, MobileMe
« on: August 06, 2009, 02:30:43 AM »
Apple Wednesday released its OS X version 10.5.8 update, which puts to bed an issue with long startup times, boosts wireless networking compatibility and reliability, and expands third party device support.

In addition to the latest version of Safari, 4.0.2, the update sharpens the accuracy of full history search within the Safari browser. Apple has also addressed an issue in which certain screen resolution settings weren't visible in the Display pane in System Preferences, Apple said in the update notes.

The OS X 10.5.8 update includes several security fixes (I will post these in a separate posting) that pertain to maliciously crafted image files that could be used to enable arbitrary code execution and foster all the attendant havoc associated with this capability.

There's also a fix for an issue related to the kernel's handling of 'fcntl' system calls; a buffer overflow that exists in the kernel's handling of AppleTalk response packets; and a flaw that could allow a maliciously crafted website to control the displayed website URL in a certificate warning.

The OS X 10.5.8 update boosts the functioning of Bluetooth with external devices such as USB Webcams and printers, improves compatibility with external USB hard drives, and adds RAW image support for a broader range of third party digital cameras, according to Apple.

OS X's functioning with Apple's subscription based MobileMe service is given attention in several areas of the update. One security fix addresses an issue in the MobileMe preference pane that could prevent login credentials from being deleted and falling into the wrong hands. Other fixes target iCal reliability with MobileMe Sync and CalDav and data reliability issues with iDisk and MobileMe, Apple said.

Apple in September plans to release Leopard's successor, OS X 10.6 Snow Leopard, and this week Amazon.com began taking pre-orders for the upcoming OS, which quickly shot to the top of the e-tailer's best seller list.

« Last Edit: August 06, 2009, 02:36:35 AM by javajolt »


Offline javajolt

  • Administrator
  • Hero Member
  • *****
  • Posts: 35213
  • Gender: Male
  • I Do Windows
    • windows10newsinfo.com
APPLE-SA-2009-08-05-1 Security Update 2009-003 / Mac OS X v10.5.8
« Reply #1 on: August 06, 2009, 02:39:31 AM »

Subject: APPLE-SA-2009-08-05-1 Security Update 2009-003 / Mac OS X v10.5.8
From: Apple Product Security <email@hidden>
Date: Wed, 5 Aug 2009 13:07:55 -0700
Delivered-to: email@hidden
Delivered-to: email@hidden

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


APPLE-SA-2009-08-05-1 Security Update 2009-003 / Mac OS X v10.5.8


Security Update 2009-003 / Mac OS X v10.5.8 is now available and
addresses the following:


bzip2
CVE-ID:  CVE-2008-1372
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.7, Mac OS X Server v10.5 through v10.5.7
Impact:  Decompressing maliciously crafted data may lead to an
unexpected application termination
Description:  An out-of-bounds memory access exists in bzip2. Opening
a maliciously crafted compressed file may lead to an unexpected
application termination. This update addresses the issue by updating
bzip2 to version 1.0.5. Further information is available via the
bzip2 web site at http://bzip.org/


CFNetwork
CVE-ID:  CVE-2009-1723
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  A maliciously crafted website may control the displayed
website URL in a certificate warning
Description:  When Safari reaches a website via a 302 redirection and
a certificate warning is displayed, the warning will contain the
original website URL instead of the current website URL. This may
allow a maliciously crafted website that is reached via an open
redirector on a user-trusted website to control the displayed website
URL in a certificate warning. This issue was addressed by returning
the correct URL in the underlying CFNetwork layer. This issue does
not affect systems prior to Mac OS X v10.5. Credit to Kevin Day of
Your.Org, and Jason Mueller of Indiana University for reporting this
issue.


ColorSync
CVE-ID:  CVE-2009-1726
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.7, Mac OS X Server v10.5 through v10.5.7
Impact:  Viewing a maliciously crafted image with an embedded
ColorSync profile may lead to an unexpected application termination
or arbitrary code execution
Description:  A heap buffer overflow exists in the handling of images
with an embedded ColorSync profile. Opening a maliciously crafted
image with an embedded ColorSync profile may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue by performing additional validation of ColorSync
profiles. Credit to Chris Evans of the Google Security Team for
reporting this issue.


CoreTypes
CVE-ID:  CVE-2009-1727
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  Users are not warned before opening certain potentially
unsafe content types
Description:  This update extends the system's list of content types
that will be flagged as potentially unsafe under certain
circumstances, such as when they are downloaded from a web page.
While these content types are not automatically launched, if manually
opened they could lead to the execution of a malicious JavaScript
payload. This update improves the system's ability to notify users
before handling content types used by Safari. Credit to Brian
Mastenbrook, and Clint Ruoho of Laconic Security for reporting this
issue.


Dock
CVE-ID:  CVE-2009-0151
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  A person with physical access to a locked system may use
four-finger Multi-Touch gestures
Description:  The screen saver does not block four-finger Multi-Touch
gestures, which may allow a person with physical access to a locked
system to manage applications or use Expose. This update addresses
the issue by properly blocking Multi-Touch gestures when the screen
saver is running. This issue only affects systems with a Multi-Touch
trackpad.


Image RAW
CVE-ID:  CVE-2009-1728
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  Viewing a maliciously crafted Canon RAW image may lead to an
unexpected application termination or arbitrary code execution
Description:  A stack buffer overflow exists in the handling of Canon
RAW images. Viewing a maliciously crafted Canon RAW image may lead to
an unexpected application termination or arbitrary code execution.
This update addresses the issue through improved bounds checking. For
Mac OS X v10.4 systems, this issue is already addressed with Digital
Camera RAW Compatibility Update 2.6. Credit to Chris Ries of Carnegie
Mellon University Computing Services for reporting this issue.


ImageIO
CVE-ID:  CVE-2009-1722
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.7, Mac OS X Server v10.5 through v10.5.7
Impact:  Viewing a maliciously crafted OpenEXR image may lead to an
unexpected application termination or arbitrary code execution
Description:  A heap buffer overflow exists in ImageIO's handling of
OpenEXR images. Viewing a maliciously crafted OpenEXR image may lead
to an unexpected application termination or arbitrary code execution.
This update addresses the issue by updating OpenEXR to version 1.6.1.
Credit to Lurene Grenier of Sourcefire VRT, and Chris Ries of
Carnegie Mellon University Computing Services for reporting this
issue.


ImageIO
CVE-ID:  CVE-2009-1721
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.7, Mac OS X Server v10.5 through v10.5.7
Impact:  Viewing a maliciously crafted OpenEXR image may lead to an
unexpected application termination or arbitrary code execution
Description:  An uninitialized memory access issue exists in
ImageIO's handling of OpenEXR images. Viewing a maliciously crafted
OpenEXR image may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue through
proper memory initialization and additional validation of OpenEXR
images. Credit: Apple.


ImageIO
CVE-ID:  CVE-2009-1720
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.7, Mac OS X Server v10.5 through v10.5.7
Impact:  Viewing a maliciously crafted OpenEXR image may lead to an
unexpected application termination or arbitrary code execution
Description:  Multiple integer overflows exist in ImageIO's handling
of OpenEXR images. Viewing a maliciously crafted OpenEXR image may
lead to an unexpected application termination or arbitrary code
execution. This update addresses the issues through improved bounds
checking. Credit: Apple.


ImageIO
CVE-ID:  CVE-2009-2188
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  Viewing a maliciously crafted image may lead to an
unexpected application termination or arbitrary code execution
Description:  A buffer overflow exists in ImageIO's handling of EXIF
metadata. Viewing a maliciously crafted image may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue through improved bounds checking. This
issue does not affect systems prior to Mac OS X v10.5.


ImageIO
CVE-ID:  CVE-2009-0040
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.7, Mac OS X Server v10.5 through v10.5.7
Impact:  Processing a maliciously crafted PNG image may lead to an
unexpected application termination or arbitrary code execution
Description:  An uninitialized pointer issue exists in the handling
of PNG images. Processing a maliciously crafted PNG image may lead to
an unexpected application termination or arbitrary code execution.
This update addresses the issue by performing additional validation
of PNG images. Credit to Tavis Ormandy of the Google Security Team
for reporting this issue.


Kernel
CVE-ID:  CVE-2009-1235
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  A local user may obtain system privileges
Description:  An implementation issue exists in the kernel's handling
of fcntl system calls. A local user may overwrite kernel memory and
execute arbitrary code with system privileges. This update addresses
the issue through improved handling of fcntl system calls. Credit to
Razvan Musaloiu-E. of Johns Hopkins University, HiNRG for reporting
this issue.


launchd
CVE-ID:  CVE-2009-2190
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  Opening many connections to an inetd-based launchd service
may lead to a denial of service
Description:  Opening many connections to an inetd-based launchd
service may cause launchd to stop servicing incoming connections to
that service until the next system restart. This update addresses the
issue through improved error handling.


Login Window
CVE-ID:  CVE-2009-2191
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.7, Mac OS X Server v10.5 through v10.5.7
Impact:  A format string issue in Login Window may lead to an
unexpected application termination or arbitrary code execution
Description:  A format string issue in Login Window's handling of
application names may lead to an unexpected application termination
or arbitrary code execution. This update addresses the issue through
improved handling of application names. Credit to Alfredo Pesoli of
0xcafebabe.it for reporting this issue.


MobileMe
CVE-ID:  CVE-2009-2192
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  Signing out of MobileMe does not remove all credentials
Description:  A logic issue exists in the MobileMe preference pane.
Signing out of the preference pane does not delete all credentials. A
person with access to the local user account may continue to access
any other system associated with the MobileMe account which had
previously been signed in for that local account. This update
addresses the issue by deleting all the credentials on sign out.


Networking
CVE-ID:  CVE-2009-2193
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  Receiving a maliciously crafted AppleTalk response packet
may lead to arbitrary code execution with system privileges or an
unexpected system shutdown
Description:  A buffer overflow exists in the kernel's handling of
AppleTalk response packets. Receiving a maliciously crafted AppleTalk
response packet may lead to arbitrary code execution with system
privileges or an unexpected system shutdown. This update addresses
the issue through improved validation of AppleTalk response packets.
Credit to Ilja van Sprundel from IOActive for reporting this issue.


Networking
CVE-ID:  CVE-2009-2194
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  A local user may cause an unexpected system shutdown
Description:  A synchronization issue exists in the handling of file
descriptor sharing over local sockets. By sending messages containing
file descriptors to a socket with no receiver, a local user may cause
an unexpected system shutdown. This update addresses the issue
through improved handling of file descriptor sharing. Credit to
Bennet Yee of Google Inc. for reporting this issue.


XQuery
CVE-ID:  CVE-2008-0674
Available for:  Mac OS X v10.5 through v10.5.7,
Mac OS X Server v10.5 through v10.5.7
Impact:  Processing maliciously crafted XML content may lead to
arbitrary code execution
Description:  A buffer overflow exists in the handling of character
classes in regular expressions in the Perl Compatible Regular
Expressions (PCRE) library used by XQuery. This may allow a remote
attacker to execute arbitrary code via a regular expression
containing a character class with a large number of characters with
Unicode code points greater than 255. This update addresses the issue
by updating PCRE to version 7.6.


Security Update 2009-003 / Mac OS X v10.5.8 may be obtained from
the Software Update pane in System Preferences, or Apple's Software
Downloads web site:
http://www.apple.com/support/downloads/


The Software Update utility will present the update that applies
to your system configuration. Only one is needed, either
Security Update 2009-003 or Mac OS X v10.5.8.


For Mac OS X v10.5.7
The download file is named: MacOSXUpd10.5.8.dmg
Its SHA-1 digest is: 11e79fb9b0ba63f211a708a1bcf8b397077a2e5e


For Mac OS X v10.5 - v10.5.6
The download file is named: MacOSXUpdCombo10.5.8.dmg
Its SHA-1 digest is: 6a3a744626503a807dd0158c41d0350aa37fe6c7


For Mac OS X Server v10.5.7
The download file is named: MacOSXServerUpd10.5.8.dmg
Its SHA-1 digest is: dbcbe49662d818cfbe796f8bfb2bfe21c64dbc9e


For Mac OS X Server v10.5 - v10.5.6
The download file is named: MacOSXServerUpdCombo10.5.8.dmg
Its SHA-1 digest is: 5f23c8253193c59562b3d39acc7daf498902e59d


For Mac OS X v10.4.11 (Intel)
The download file is named: SecUpd2009-003Intel.dmg
Its SHA-1 digest is: 49cff2d44c1f4bce1848aadadaaa22ac8807824f


For Mac OS X v10.4.11 (PowerPC)
The download file is named: SecUpd2009-003PPC.dmg
Its SHA-1 digest is: 29d8b4678bdc592b672d091cce2e6e7ef3d43b28


For Mac OS X Server v10.4.11 (Universal)
The download file is named: SecUpdSrvr2009-003Univ.dmg
Its SHA-1 digest is: e1fc266df664ea495b3b5b4cb978aa7d705b8f92


For Mac OS X Server v10.4.11 (PowerPC)
The download file is named: SecUpdSrvr2009-003PPC.dmg
Its SHA-1 digest is: ba204cf8d09d4d2c7fd30573e67e47bfd8e5f2ab


Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222


This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)


iQEcBAEBAgAGBQJKedeJAAoJEHkodeiKZIkBN6MH/1CPnWDjLi2OMTNt0fLWKMsz
LMXCXYFDijQwr/YFB3xSdvIilmy1NOryhEiPPTbBAYVLePx4y3kmkWjmMwk9rv2g
XvDmY7xyjt9WwLj2ZbtO2GeAfIpBEkVQGYWgffdJ7YMDZpHGBA8YPKbZ9BCkbbEL
OKvUfQB4q5NFP++cljrpY//L/s9SGCxWSV4hX7CxCoajVJu0ErhcVZ+NDdtvE2g3
t93liK50wVay0nWCFEbcBlgr7UhQamkmBn27o+VxTrDut+f+x9Wdv+bn/MjQObUq
T2dpWgz8pRKgiR9Bbc5wfHCK8wjgCViB6zJ+59b5bin7lXbSHH30mUL+c/MFydE=
=lWU5
-----END PGP SIGNATURE-----