Home / mailings APPLE-SA-2011-03-21-1 Mac OS X v10.6.7 and Security Update 2011-001
Posted on 21 March 2011
Apple Security-announce-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2011-03-21-1 Mac OS X v10.6.7 and Security Update 2011-001
Mac OS X v10.6.7 and Security Update 2011-001 are now available and
address the following:
AirPort
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: When connected to Wi-Fi, an attacker on the same network may
be able to cause a system reset
Description: A divide by zero issue existed in the handling of Wi-Fi
frames. When connected to Wi-Fi, an attacker on the same network may
be able to cause a system reset. This issue does not affect systems
prior to Mac OS X v10.6.
CVE-ID
CVE-2011-0172
Apache
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in Apache 2.2.15
Description: Apache is updated to version 2.2.17 to address several
vulnerabilities, the most serious of which may lead to a denial of
service. Further information is available via the Apache web site at
http://httpd.apache.org/
CVE-ID
CVE-2010-1452
CVE-2010-2068
AppleScript
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Running an AppleScript Studio-based application that allows
untrusted input to be passed to a dialog may lead to an unexpected
application termination or arbitrary code execution
Description: A format string issue existed in AppleScript Studio's
generic dialog commands ("display dialog" and "display alert").
Running an AppleScript Studio-based application that allows untrusted
input to be passed to a dialog may lead to an unexpected application
termination or arbitrary code execution.
CVE-ID
CVE-2011-0173 : Alexander Strange
ATS
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously
crafted embedded font may lead to arbitrary code execution
Description: A heap buffer overflow issue existed in the handling of
OpenType fonts. Viewing or downloading a document containing a
maliciously crafted embedded font may lead to arbitrary code
execution.
CVE-ID
CVE-2011-0174
ATS
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously
crafted embedded font may lead to arbitrary code execution
Description: Multiple buffer overflow issues existed in the handling
of TrueType fonts. Viewing or downloading a document containing a
maliciously crafted embedded font may lead to arbitrary code
execution.
CVE-ID
CVE-2011-0175 : Christoph Diehl of Mozilla, Felix Grobert of the
Google Security Team, Marc Schoenefeld of Red Hat Security Response
Team, Tavis Ormandy and Will Drewry of Google Security Team
ATS
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously
crafted embedded font may lead to arbitrary code execution
Description: Multiple buffer overflow issues existed in the handling
of Type 1 fonts. Viewing or downloading a document containing a
maliciously crafted embedded font may lead to arbitrary code
execution.
CVE-ID
CVE-2011-0176 : Felix Grobert of the Google Security Team, geekable
working with TippingPoint's Zero Day Initiative
ATS
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously
crafted embedded font may lead to arbitrary code execution
Description: Multiple buffer overflow issues existed in the handling
of SFNT tables. Viewing or downloading a document containing a
maliciously crafted embedded font may lead to arbitrary code
execution.
CVE-ID
CVE-2011-0177 : Marc Schoenefeld of Red Hat Security Response Team
bzip2
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Using the command line bzip2 or bunzip2 tool to decompress a
bzip2 file may result in an unexpected application termination or
arbitrary code execution
Description: An integer overflow issue existed in bzip2's handling
of bzip2 compressed files. Using the command line bzip2 or bunzip2
tool to decompress a bzip2 file may result in an unexpected
application termination or arbitrary code execution.
CVE-ID
CVE-2010-0405
CarbonCore
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Applications that use FSFindFolder() with the
kTemporaryFolderType flag may be vulnerable to a local information
disclosure
Description: When used with the kTemporaryFolderType flag, the
FSFindFolder() API returns a directory that is world readable. This
issue is addressed by returning a directory that is only readable by
the user that the process is running as.
CVE-ID
CVE-2011-0178
ClamAV
Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6.6
Impact: Multiple vulnerabilities in ClamAV
Description: Multiple vulnerabilities exist in ClamAV, the most
serious of which may lead to arbitrary code execution. This update
addresses the issues by updating ClamAV to version 0.96.5. ClamAV is
distributed only with Mac OS X Server systems. Further information is
available via the ClamAV website at http://www.clamav.net/
CVE-ID
CVE-2010-0405
CVE-2010-3434
CVE-2010-4260
CVE-2010-4261
CVE-2010-4479
CoreText
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously
crafted embedded font may lead to arbitrary code execution
Description: A memory corruption issue existed in CoreText's
handling of font files. Viewing or downloading a document containing
a maliciously crafted embedded font may lead to arbitrary code
execution.
CVE-ID
CVE-2011-0179 : Christoph Diehl of Mozilla
File Quarantine
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Definition added
Description: The OSX.OpinionSpy definition has been added to the
malware check within File Quarantine.
HFS
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: A local user may be able to read arbitrary files from an
HFS, HFS+, or HFS+J filesystem
Description: An integer overflow issue existed in the handling of
the F_READBOOTSTRAP ioctl. A local user may be able to read arbitrary
files from an HFS, HFS+, or HFS+J filesystem.
CVE-ID
CVE-2011-0180 : Dan Rosenberg of Virtual Security Research
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: A heap buffer overflow issue existed in ImageIO's
handling of JPEG images. Visiting a maliciously crafted website may
lead to an unexpected application termination or arbitrary code
execution. > <body>
CVE-ID
CVE-2011-0170 : Andrzej Dyjak working with iDefense VCP
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted XBM image may result in an
unexpected application termination or arbitrary code execution
Description: An integer overflow issue existed in ImageIO's handling
of XBM images. Viewing a maliciously crafted XBM image may result in
an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0181 : Harry Sintonen
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted TIFF image may result in an
unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in libTIFF's handling of JPEG
encoded TIFF images. Viewing a maliciously crafted TIFF image may
result in an unexpected application termination or arbitrary code
execution.
CVE-ID
CVE-2011-0191 : Apple
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted TIFF image may result in an
unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in libTIFF's handling of
CCITT Group 4 encoded TIFF images. Viewing a maliciously crafted TIFF
image may result in an unexpected application termination or
arbitrary code execution.
CVE-ID
CVE-2011-0192 : Apple
ImageIO
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted JPEG-encoded TIFF image may
result in an unexpected application termination or arbitrary code
execution
Description: An integer overflow issue existed in ImageIO's handling
of JPEG-encoded TIFF images. Viewing a maliciously crafted TIFF image
may result in an unexpected application termination or arbitrary code
execution. This issue does not affect systems prior to Mac OS X
v10.6.
CVE-ID
CVE-2011-0194 : Dominic Chell of NGS Secure
Image RAW
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted Canon RAW image may result in
an unexpected application termination or arbitrary code execution
Description: Multiple buffer overflow issues existed in Image RAW's
handling of Canon RAW images. Viewing a maliciously crafted Canon RAW
image may result in an unexpected application termination or
arbitrary code execution.
CVE-ID
CVE-2011-0193 : Paul Harrington of NGS Secure
Installer
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to the
installation of an agent that contacts an arbitrary server when the
user logs in, and mislead the user into thinking that the connection
is with Apple
Description: A URL processing issue in Install Helper may lead to
the installation of an agent that contacts an arbitrary server when
the user logs in. The dialog resulting from a connection failure may
lead the user to believe that the connection was attempted with
Apple. This issue is addressed by removing Install Helper.
CVE-ID
CVE-2011-0190 : Aaron Sigel of vtty.com
Kerberos
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in MIT Kerberos 5
Description: Multiple cryptographic issues existed in MIT Kerberos
5. Only CVE-2010-1323 affects Mac OS X v10.5. Further information on
the issues and the patches applied is available via the MIT Kerberos
website at http://web.mit.edu/Kerberos/
CVE-ID
CVE-2010-1323
CVE-2010-1324
CVE-2010-4020
CVE-2010-4021
Kernel
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: A local user may be able to execute arbitrary code with
system privileges
Description: A privilege checking issue existed in the i386_set_ldt
system call's handling of call gates. A local user may be able to
execute arbitrary code with system privileges. This issue is
addressed by disallowing creation of call gate entries via
i386_set_ldt().
CVE-ID
CVE-2011-0182 : Jeff Mears
Libinfo
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: A remote attacker may be able to cause a denial of service
on hosts that export NFS file systems
Description: An integer truncation issue existed in Libinfo's
handling of NFS RPC packets. A remote attacker may be able to cause
NFS RPC services such as lockd, statd, mountd, and portmap to become
unresponsive.
CVE-ID
CVE-2011-0183 : Peter Schwenk of the University of Delaware
libxml
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in libxml's XPath
handling. Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2010-4008 : Bui Quang Minh from Bkis (www.bkis.com)
libxml
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: A double free issue existed in libxml's handling of
XPath expressions. Visiting a maliciously crafted website may lead to
an unexpected application termination or arbitrary code execution.
This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2010-4494 : Yang Dingning of NCNIPC, Graduate University of
Chinese Academy of Sciences
Mailman
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in Mailman 2.1.13
Description: Multiple cross-site scripting issues existed in Mailman
2.1.13. These issues are addressed by updating Mailman to version
2.1.14. Further information is available via the Mailman site at
http://mail.python.org/pipermail/mailman-
announce/2010-September/000154.html
CVE-ID
CVE-2010-3089
PHP
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in PHP 5.3.3
Description: PHP is updated to version 5.3.4 to address multiple
vulnerabilities, the most serious of which may lead to arbitrary code
execution. Further information is available via the PHP website at
http://www.php.net/
CVE-ID
CVE-2006-7243
CVE-2010-2950
CVE-2010-3709
CVE-2010-3710
CVE-2010-3870
CVE-2010-4150
CVE-2010-4409
PHP
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Multiple vulnerabilities in PHP 5.2.14
Description: PHP is updated to version 5.2.15 to address multiple
vulnerabilities, the most serious of which may lead to arbitary code
execution. Further information is available via the PHP website at
http://www.php.net/
CVE-ID
CVE-2010-3436
CVE-2010-3709
CVE-2010-4150
QuickLook
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Downloading a maliciously crafted Excel file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickLook's
handling of Excel files. Downloading a maliciously crafted Excel file
may lead to an unexpected application termination or arbitrary code
execution. This issue does not affect systems prior to Mac OS X
v10.6.
CVE-ID
CVE-2011-0184 : Tobias Klein working with Verisign iDefense Labs
QuickLook
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Downloading a maliciously crafted Microsoft Office file may
lead to an unexpected application termination or arbitrary code
execution
Description: A memory corruption issues existed in QuickLook's
handling of Microsoft Office files. Downloading a maliciously crafted
Microsoft Office file may lead to an unexpected application
termination or arbitrary code execution.
CVE-ID
CVE-2011-1417 : Charlie Miller and Dion Blazakis working with
TippingPoint's Zero Day Initiative
QuickTime
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted JPEG2000 image with QuickTime
may lead to an unexpected application termination or arbitrary code
execution
Description: Multiple memory corruption issues existed in
QuickTime's handling of JPEG2000 images. Viewing a maliciously
crafted JPEG2000 image with QuickTime may lead to an unexpected
application termination or arbitrary code execution.
CVE-ID
CVE-2011-0186 : Will Dormann of the CERT/CC
QuickTime
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: An integer overflow existed in QuickTime's handling of
movie files. Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution. For
Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.
CVE-ID
CVE-2010-4009 : Honggang Ren of Fortinet's FortiGuard Labs
QuickTime
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted FlashPix image may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickTime's
handling of FlashPix images. Viewing a maliciously crafted FlashPix
image may lead to an unexpected application termination or arbitrary
code execution. For Mac OS X v10.5 this issue was addressed in
QuickTime 7.6.9.
CVE-ID
CVE-2010-3801 : Damian Put working with TippingPoint's Zero Day
Initiative, and Rodrigo Rubira Branco from the Check Point
Vulnerability Discovery Team
QuickTime
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to the
disclosure of video data from another site
Description: A cross-origin issue existed in QuickTime plug-in's
handling of cross-site redirects. Visiting a maliciously crafted
website may lead to the disclosure of video data from another site.
This issue is addressed by preventing QuickTime from following cross-
site redirects.
CVE-ID
CVE-2011-0187 : Nirankush Panchbhai and Microsoft Vulnerability
Research (MSVR)
QuickTime
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted QTVR movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickTime's
handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie
files. Viewing a maliciously crafted QTVR movie file may lead to an
unexpected application termination or arbitrary code execution. For
Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.
CVE-ID
CVE-2010-3802 : an anonymous researcher working with TippingPoint's
Zero Day Initiative
Ruby
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Running a Ruby script that uses untrusted input to create a
BigDecimal object may lead to an unexpected application termination
or arbitrary code execution
Description: An integer truncation issue existed in Ruby's
BigDecimal class. Running a Ruby script that uses untrusted input to
create a BigDecimal object may lead to an unexpected application
termination or arbitrary code execution. This issue only affects
64-bit Ruby processes.
CVE-ID
CVE-2011-0188 : Apple
Samba
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: If SMB file sharing is enabled, a remote attacker may cause
a denial of service or arbitrary code execution
Description: A stack buffer overflow existed in Samba's handling of
Windows Security IDs. If SMB file sharing is enabled, a remote
attacker may cause a denial of service or arbitrary code execution.
CVE-ID
CVE-2010-3069
Subversion
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: Subversion servers that use the non-default "SVNPathAuthz
short_circuit" mod_dav_svn configuration setting may allow
unauthorized users to access portions of the repository
Description: Subversion servers that use the non-default
"SVNPathAuthz short_circuit" mod_dav_svn configuration setting may
allow unauthorized users to access portions of the repository. This
issue is addressed by updating Subversion to version 1.6.13. This
issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2010-3315
Terminal
Available for: Mac OS X v10.6 through v10.6.6,
Mac OS X Server v10.6 through v10.6.6
Impact: When ssh is used in Terminal's "New Remote Connection"
dialog, SSH version 1 is selected as the default protocol version
Description: When ssh is used in Terminal's "New Remote Connection"
dialog, SSH version 1 is selected as the default protocol version.
This issue is addressed by changing the default protocol version to
"Automatic". This issue does not affect systems prior to Mac OS X
v10.6.
CVE-ID
CVE-2011-0189 : Matt Warren of HNW Inc.
X11
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in FreeType
Description: Multiple vulnerabilities existed in FreeType, the most
serious of which may lead to arbitrary code execution when processing
a maliciously crafted font. These issues are addressed by updating
FreeType to version 2.4.3. Further information is available via the
FreeType site at http://www.freetype.org/
CVE-ID
CVE-2010-3814
CVE-2010-3855
Mac OS X v10.6.7 and Security Update 2011-001 may be obtained from
the Software Update pane in System Preferences, or Apple's Software
Downloads web site:
http://www.apple.com/support/downloads/
The Software Update utility will present the update that applies
to your system configuration. Only one is needed, either
Security Update 2011-001 or Mac OS X v10.6.7.
For Mac OS X v10.6.6
The download file is named: MacOSXUpd10.6.7.dmg
Its SHA-1 digest is: 1e1cc5da36d2d175d2b67e7fd8fc4ab8c89f2e8b
For Mac OS X v10.6 - v10.6.5
The download file is named: MacOSXUpdCombo10.6.7.dmg
Its SHA-1 digest is: 4f359529e08482be1fcbe3b7500c7a73062a8e8e
For Mac OS X Server v10.6.6
The download file is named: MacOSXServerUpd10.6.7.dmg
Its SHA-1 digest is: e5df6c1e38f76b8f8c252f4c97a2ee94d9b55403
For Mac OS X Server v10.6 - v10.6.5
The download file is named: MacOSXServerUpdCombo10.6.7.dmg
Its SHA-1 digest is: 38b5564656de9714ce143bf8739c8525d38d5656
For Mac OS X 10.6.7 for MacBook Pro Early 2011
The download file is named: MacOSXUpd10.6.7MBPEarly2011.dmg
Its SHA-1 digest is: 846e776582678d8ec3683d3466b239acda34c110
For Mac OS X v10.5.8
The download file is named: SecUpd2011-001.dmg
Its SHA-1 digest is: bbbd6cad211eafc900e2562f900b875287e533ff
For Mac OS X Server v10.5.8
The download file is named: SecUpdSrvr2011-001.dmg
Its SHA-1 digest is: bb42b1372940c8f3130de306cb4a2d607ce48a1d
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/