MAAS History
Archives
Monday
Jun082009

Safari 4.0 Update

Safari 4.0 addresses issues in CFNetwork, libxml, Private browsing session ghosting, Web Kit and passwords remaining in memory on application exit. In addition to some new features over fifty security issues have been addressed and fixed.

Tuesday
Jun022009

QuickTime 7.6.2 Update

Apple also is including an update of QuickTime to address several vectors which can be exploited by maliciously crafted images, videos or music. In the worst case an attacker can gain complete control by exploiting a privileged user. 

Tuesday
Jun022009

iTunes 8.2 Update

Apple has plugged a buffer overflow in iTunes which would allow an attacker to insert code. In a primitive attack the application will terminate. The update improves the overall bounds checking.

Tuesday
May262009

Java Runtime Environment in Mac OSX

Java Runtime Environment in Mac OSX has vulnerabilities that Sun has released updates to. Apple will have to provide an update via Software Update for general users shortly, see references from a complete list from the Sun Solve site. The issues include privilege escalation, failure to check signatures, buffer overflows, parsing of Zip allowing reading of arbitrary memory and code from local system accessing the local host. The current test below will result in a bootstrap failure.

At this time users should disable Java, if however it is needed then only trusted sites' .class and JAR files should be run. 

 <<Note: Test site below is a link to test CVE-2008-5353, it will cause your system to crash. Currently Virus Barrier is detecting this security hole. It is not a live link, you are responsible, you have to cut and paste the link.>>

http://landonf.bikemonkey.org/static/moab-tests/CVE-2008-5353/hello.html

Wednesday
May132009

Mac OSX Security Updates for Client and Server

Over 67 vulnerabilities spanning Mac OSX 10.4.x-10.5.x including in Apache, BIND, CoreGraphics, CUPS, enscript, Help Viewer, International Components for Unicode, Kerberos, Launch Services, Net SNMP, ATS, CFNetwork, CScope, Disk Images, Flash Plug-In iChat, IPSec, Kernel libxml ad Network Time. 

Within CoreGraphics it relates mostly to PDF's, the exploit requires a users to loaded a specially crafted file from download or a web site. Used in conjunction it is possible for and elevation of privileges so having a limit account is not a full proof solution. ATS service can experience a buffer overflow due to the way that t handles Compact Fonts, this again used with other vulnerabilities can allow an attacker to elevate privileges. Use of a limited account is not one hundred percent effective. 

Sites that are hosted from Mac OSX servers using Apache can publish specially crafted files that can substitute their own response for any web page being hosted on that system. CFnetwork flaw is related Set-Cookie parsing which can result in certain cookies being sent with clear text information. For developers that use XCode and need to print line number, many resort to using enscript. This update address several issues including the possibility to execute arbitrary code.

The update also address various issues related to Safari including the heap buffer issues related to libxml.There are also updates for Safari Public Beta which should not for any reason be used on a production system or a system with access to internal network resources.