-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-214A Apple Mac Products Affected by Multiple Vulnerabilities Original release date: August 02, 2006 Last revised: -- Source: US-CERT Systems Affected * Apple Mac OS X version 10.3.9 and earlier (Panther) * Apple Mac OS X version 10.4.7 and earlier (Tiger) * Apple Mac OS X Server version 10.3.9 and earlier * Apple Mac OS X Server version 10.4.7 and earlier * Apple Safari web browser * Apple Mail Overview Apple has released Security Update 2006-004 to correct multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser, Mail, and other products. The most serious of these vulnerabilities may allow a remote attacker to execute arbitrary code. Impacts of other vulnerabilities include bypass of security restrictions and denial of service. I. Description Apple Security Update 2006-004 resolves a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, Mail, and other products. Further details are available in the individual Vulnerability Notes. This security update addresses vulnerabilities in a range of different components, including the handling of a number of different image file formats, ZIP archive files, and HTML web pages, among others. II. Impact The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service. III. Solution Install an update Install Apple Security Update 2006-004. This and other updates are available via Apple Update. Workaround Disable "Open 'safe' files after downloading" For additional protection, disable the Safari web browser option to "Open 'safe' files after downloading," as specified in "Securing Your Web Browser." Note that this workaround will not mitigate all of the vulnerabilities described in the Apple Security Update, only those which are exacerbated by the default behavior of the Safari web browser. Appendix A. References * Vulnerability Notes for Apple Security Update 2006-004 - <http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-004> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/#Safari> * Apple Security Update 2006-004 - <http://docs.info.apple.com/article.html?artnum=304063> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> _________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-214A.html> _________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@xxxxxxxx> with "TA06-214A Feedback VU#566132" in the subject. _________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> _________________________________________________________________ Revision History August 02, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRNEIu+xOF3G+ig+rAQKbvwf+N6TRnpwqcmrlUfA7k1yuRCLCf3yo854x JVy2Uq7Zs5WEqWK1qusPl3thyUS5JYCZzzPQI6pKq5zOOzyu5dqmHLFzstoZAhaz pMTVX4PmMalFEFQV0o4pOi1/pGgu+2PXN8qo2LjSsFwr6xP9FfBQTI8Jov33cLsb WjQyfxj/J8+nMQnCUlL84p7CuK4TdPRwuMVNMGYb8b9pB3SQ1XJ0EFt4UvO8VNqp J32UCJw+LwSKpcBzjQRpw3ZBUpmFgOkZzLux/SiP8+1cyjmbWxxGjW21EfNExOXS C2UpM+CQmoPMLAhTTPbKWs18qSdwcmeRLTeOW4Ao3oUj0QRD5QCFpA== =RByX -----END PGP SIGNATURE-----