-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA05-229A Apple Mac Products are Affected by Multiple Vulnerabilities Original release date: August 17, 2005 Last revised: -- Source: US-CERT Systems Affected * Apple Mac OS X version 10.3.9 (Panther) and version 10.4.2 (Tiger) * Apple Mac OS X Server version 10.3.9 and version 10.4.2 * Apple Safari web browser Please see Apple Security Update 2005-007 for further information. Overview Apple has released Security Update 2005-007 to address multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser, and other products. The most serious of these vulnerabilities may allow a remote attacker to execute arbitrary code. Impacts of other vulnerabilities include bypassing security restrictions and denial of service. I. Description Apple Security Update 2005-007 resolves a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, and other products. Further details are available in the following Vulnerability Notes: VU#913820 - Apple Mac OS X Directory Services contains a buffer overflow A buffer overflow in Apple Mac OS X Directory Service's authentication process may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. (CAN-2005-2507) VU#461412 - Apple Mac OS X Server servermgrd authentication vulnerable to buffer overflow Apple Mac OS X Server servermgrd contains an unspecified buffer overflow vulnerability in its authentication handling routines. This vulnerability may lead to remote execution of arbitrary code. (CAN-2005-2518) VU#435188 - Apple Mac OS X AppKit vulnerable to buffer overflow via the handling of maliciously crafted rich text files A buffer overflow vulnerability exists in a component of Apple's Mac OS X operating system that handles rich text files. (CAN-2005-2501) VU#172948 - Apple Mac OS X AppKit vulnerable to buffer overflow via maliciously crafted Microsoft Word files A buffer overflow vulnerability exists in a component of Apple's Mac OS X operating system that handles Microsoft Word files. (CAN-2005-2502) VU#420316 - Apple Mac OS X Safari vulnerable to arbitrary command execution via URLs in PDF files Apple Mac OS X WebKit and Safari security controls may be bypassed, possibly allowing remote command execution. (CAN-2005-2522) VU#709220 - Apple Safari fails to perform security checks on links in rich text content Apple Safari fails to perform security checks on hyperlinks in rich text content, which may allow an attacker to execute arbitrary commands on a vulnerable system. (CAN-2005-2516) Please note that Apple Security Update 2005-007 addresses additional vulnerabilities not described above. As further information becomes available, we will publish individual Vulnerability Notes. II. Impact The impacts of these vulnerabilities vary. For information about specific impacts please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service. III. Solution Install an update Install the update as described in Apple Security Update 2005-007. In addition, this update is available via Apple Update. Appendix A. References * US-CERT Vulnerability Note VU#913820 - <http://www.kb.cert.org/vuls/id/913820> * US-CERT Vulnerability Note VU#461412 - <http://www.kb.cert.org/vuls/id/461412> * US-CERT Vulnerability Note VU#435188 - <http://www.kb.cert.org/vuls/id/435188> * US-CERT Vulnerability Note VU#172948 - <http://www.kb.cert.org/vuls/id/172948> * US-CERT Vulnerability Note VU#420316 - <http://www.kb.cert.org/vuls/id/420316> * US-CERT Vulnerability Note VU#709220 - <http://www.kb.cert.org/vuls/id/709220> * Apple Security Update 2005-007 - <http://docs.info.apple.com/article.html?artnum=302163> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA05-229A.html> ____________________________________________________________________ Feedback can be directed to US-CERT. Please send email to <cert@xxxxxxxx> with "TA05-229A Feedback VU#913820" in the subject. ____________________________________________________________________ Mailing list information: <http://www.us-cert.gov/cas/> ____________________________________________________________________ Produced 2005 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History August 17, 2005: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQwOKkRhoSezw4YfQAQLxywgAkWTcoA3KoWAiY5YYPGejCVbWw/yFzAqy 4Fb0z9WXfwhwB3/L/IxLvJGhPdVF/b6buP/KZgIxalwsRu6GPjJp5Aj+Cbtf/8KI 2ca0bRxS3vZJS52ZOEVpS2Z2M8JdcBA2CgfvIw6GEklXD9MTjXXwYUhB6tYK4Ar0 +UAk6xxaaMRvKztOYbRZhy5/5Kz2Xd9a5UwO/hbojQmilv4elW3iZhGWP+nLEpSI D680yttkY++UzmYGYHO0Wm+SAK4fzXKxs/4PMfWvNgP8lKJsHXjjr7KLFtmgCiWU oxhOB8RdqVNTKE2kYEq1kiopusBtwK/x35VNr3uCjg23CxYuv8HAjw== =yJpi -----END PGP SIGNATURE-----