Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:15259
HistoryNov 30, 2006 - 12:00 a.m.

US-CERT Technical Cyber Security Alert TA06-333A -- Apple Releases Security Update to Address Multiple Vulnerabilities

2006-11-3000:00:00
vulners.com
7

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

               National Cyber Alert System

        Technical Cyber Security Alert TA06-333A

Apple Releases Security Update to Address Multiple Vulnerabilities

Original release date: November 29, 2006
Last revised: –
Source: US-CERT

Systems Affected

 * Apple Mac OS X version 10.3.x and 10.4.x
 * Apple Mac OS X Server version 10.3.x and 10.4.x
 * Apple Safari web browser

These vulnerabilities affect both Intel-based and PowerPC-based Apple
systems.

Overview

Apple has released Security Update 2006-007 to correct multiple
vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web
browser. Vulnerabilities in OpenSSL, gzip, and other products are also
addressed. The most serious of these vulnerabilities may allow a
remote attacker to execute arbitrary code. Attackers may take
advantage of the less serious vulnerabilities to bypass security
restrictions or cause a denial of service.

I. Description

Apple Security Update 2006-007 addresses a number of vulnerabilities
affecting Mac OS X, OS X Server, Safari web browser, and other
products. Further details are available in the related vulnerability
notes.

This security update also addresses previously known vulnerabilities
in PHP, Perl, OpenSSL, and gzip, which are shipped with Mac OS X. The
OpenSSL vulnerabilities are documented in multiple vulnerability
notes. Information is also available through the OpenSSL
vulnerabilities page. Information about the vulnerabilities in gzip is
available in a series of vulnerability notes.

II. Impact

The impacts of these vulnerabilities vary. For specific details, see
the appropriate vulnerability notes. Potential consequences include
remote execution of arbitrary code or commands, bypass of security
restrictions, and denial of service.

III. Solution

Install updates

Install Apple Security Update 2006-007. This and other updates are
available via Apple Update or via Apple Downloads.

IV. References

 * Vulnerability Notes for Apple Security Update 2006-007 -
   <http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-007>

 * Vulnerability Notes for OpenSSL Security Advisory [28th September
   2006] -

<http://www.kb.cert.org/vuls/byid?searchview&amp;query=openssl_secadv_20060928&gt;

 * Vulnerability Note VU#845620 -
   &lt;http://www.kb.cert.org/vuls/id/845620&gt;

 * Vulnerability Note VU#933712 -
   &lt;http://www.kb.cert.org/vuls/id/933712&gt;

 * Vulnerability Note VU#381508 -
   &lt;http://www.kb.cert.org/vuls/id/381508&gt;

 * Vulnerability Note VU#554780 -
   &lt;http://www.kb.cert.org/vuls/id/554780&gt;

 * Vulnerability Note VU#596848 -
   &lt;http://www.kb.cert.org/vuls/id/596848&gt;

 * Vulnerability Note VU#773548 -
   &lt;http://www.kb.cert.org/vuls/id/773548&gt;

 * About the security content of Security Update 2006-007 -
   &lt;http://docs.info.apple.com/article.html?artnum=304829&gt;

 * Mac OS X: Updating your software -
   &lt;http://docs.info.apple.com/article.html?artnum=106704&gt;

 * Apple Downloads - &lt;http://www.apple.com/support/downloads/&gt;

 * OpenSSL: OpenSSL vulnerabilities -
   &lt;http://www.openssl.org/news/vulnerabilities.html&gt;

 * Securing Your Web Browser -
   &lt;http://www.us-cert.gov/reading_room/securing_browser/#Safari&gt;

The most recent version of this document can be found at:

 &lt;http://www.us-cert.gov/cas/techalerts/TA06-333A.html&gt;

Feedback can be directed to US-CERT Technical Staff. Please send
email to <[email protected]> with "TA06-333A Feedback VU#191336" in the
subject.


Produced 2006 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html&gt;


Revision History

November 29, 2006: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRW33NuxOF3G+ig+rAQJtiggApJKRh7x+z8vp0xb26sE16RUOD3epcrk6
lJZ4rXnqVqoFacAt0Ucb8T43/Uc4N85UMa695YbFspYZum3hcGZo+WnNPolGUeRz
iN/4bfKgzekfpbHxf6T3YvQYp+PVMRfHPUcxfaZDYXhu2813N4SSQpM59KRL5BD7
xr+5VvB09biVKlzpEdgtk2EHcqc+sMF5+o3cCgDJCnJNL+NG4J6d/hsyNP15ekTf
8m0W4rJonUe2gR2Bp7F1Y47KgRr3BT1aH2gxUSim9qEJpPdP/CkmGoFp+BfrFP9q
A580LOrqFK8HIly1fbPKb26p2theUUESnQqM9Ob8xolkCDLy6h7ssg==
=f7N+
-----END PGP SIGNATURE-----