Apple Mac Products are Affected by Multiple Vulnerabilities
- Apple Mac OS X version 10.3.9 (Panther) and version 10.4.2 (Tiger)
- Apple Mac OS X Server version 10.3.9 and version 10.4.2
- Apple Safari web browser
Apple has released Security Update 2005-007 to address multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser, and other products. The most serious of these vulnerabilities may allow a remote attacker to execute arbitrary code. Impacts of other vulnerabilities include bypassing security restrictions and denial of service.
Apple Security Update 2005-007 resolves a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, and other products. Further details are available in the following Vulnerability Notes:
VU#913820 - Apple Mac OS X Directory Services contains a buffer overflow
A buffer overflow in Apple Mac OS X Directory Service's authentication process may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
VU#461412 - Apple Mac OS X Server servermgrd authentication vulnerable to buffer overflow
Apple Mac OS X Server servermgrd contains an unspecified buffer overflow vulnerability in its authentication handling routines. This vulnerability may lead to remote execution of arbitrary code.
VU#435188 - Apple Mac OS X AppKit vulnerable to buffer overflow via the handling of maliciously crafted rich text files
A buffer overflow vulnerability exists in a component of Apple's Mac OS X operating system that handles rich text files.
VU#172948 - Apple Mac OS X AppKit vulnerable to buffer overflow via maliciously crafted Microsoft Word files
A buffer overflow vulnerability exists in a component of Apple's Mac OS X operating system that handles Microsoft Word files.
VU#420316 - Apple Mac OS X Safari vulnerable to arbitrary command execution via URLs in PDF files
Apple Mac OS X WebKit and Safari security controls may be bypassed, possibly allowing remote command execution.
VU#709220 - Apple Safari fails to perform security checks on links in rich text content
Apple Safari fails to perform security checks on hyperlinks in rich text content, which may allow an attacker to execute arbitrary commands on a vulnerable system.
The impacts of these vulnerabilities vary. For information about specific impacts please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service.
Install an update
Appendix A. References
- US-CERT Vulnerability Note VU#913820 - http://www.kb.cert.org/vuls/id/913820
- US-CERT Vulnerability Note VU#461412 - http://www.kb.cert.org/vuls/id/461412
- US-CERT Vulnerability Note VU#435188 - http://www.kb.cert.org/vuls/id/435188
- US-CERT Vulnerability Note VU#172948 - http://www.kb.cert.org/vuls/id/172948
- US-CERT Vulnerability Note VU#420316 - http://www.kb.cert.org/vuls/id/420316
- US-CERT Vulnerability Note VU#709220 - http://www.kb.cert.org/vuls/id/709220
- Apple Security Update 2005-007 - http://docs.info.apple.com/article.html?artnum=302163
- Mac OS X: Updating your software - http://docs.info.apple.com/article.html?artnum=106704
These vulnerabilities were reported in Apple Security Update 2005-007. Please see the Vulnerability Notes for individual reporter acknowledgements.
Feedback can be directed to the authors: US-CERT Technical Staff.
August 17, 2005: Initial release