- Apple Mac OS X version 10.3.9 (Panther) and version 10.4.6 (Tiger)
- Apple Mac OS X Server version 10.3.9 and version 10.4.6
- Apple Safari web browser
- Apple Mail
Apple has released Security Update 2006-003 to correct multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser, Mail, and other products. The most serious of these vulnerabilities may allow a remote attacker to execute arbitrary code. Impacts of other vulnerabilities include bypassing security restrictions and denial of service.
Apple Security Update 2006-003 resolves a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, Mail, and other products. Further details are available in the individual Vulnerability Notes.
The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service.
Install an update
Disable "Open 'safe' files after downloading"
For additional protection, disable the option to "Open 'safe' files after downloading," as specified in "Securing Your Web Browser."
Appendix A. References
- Vulnerability Notes for Apple Security Update 2006-003 - http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-003
- Securing Your Web Browser - http://www.us-cert.gov/reading_room/securing_browser/#Safari
- Apple Security Update 2006-003 - http://docs.info.apple.com/article.html?artnum=303737
- Mac OS X: Updating your software - http://docs.info.apple.com/article.html?artnum=106704
These vulnerabilities were reported in Apple Security Update 2006-003. Please see the Vulnerability Notes for individual reporter acknowledgements.Feedback can be directed to US-CERT.
May 12, 2006: Initial release
May 16, 2006: Added Vulnerability Notes reference, changed feedback text