Apple Mac Products are Affected by Multiple Vulnerabilities
Original release date: March 3, 2006
Last revised: March 3, 2006
Source: US-CERT
Systems Affected
- Apple Mac OS X version 10.3.9 (Panther) and version 10.4.5 (Tiger)
- Apple Mac OS X Server version 10.3.9 and version 10.4.5
- Apple Safari web browser
Previous versions of Mac OS X may also be affected. Please see Apple Security Update 2006-001 for further information.
Overview
Apple has released Security Update 2006-001 to correct multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser, and other products. The most serious of these vulnerabilities may allow a remote attacker to execute arbitrary code. Impacts of other vulnerabilities include bypassing security restrictions and denial of service.
I. Description
Apple Security Update 2006-001 resolves a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, and other products. Further details are available in the following Vulnerability Notes:
VU#999708 - Apple Safari automatically executes arbitrary shell commands or code
Apple Safari fails to properly determine file safety, allowing a remote unauthenticated attacker to execute arbitrary commands or code.
(CVE-2006-0848)
VU#351217 - Apple Safari WebKit component vulnerable to buffer overflow
Apple Safari WebKit component is vulnerable to buffer overflow. This vulnerability may allow are remote attacker to execute arbitrary code or cause a denial-of-service condition.
(CVE-2005-4504)
VU#176732 - Apple Safari vulnerable to buffer overflow
Apple Safari is vulnerable to a stack-based buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-0387)
Please note that Apple Security Update 2006-001 addresses additional vulnerabilities not described above. As further information becomes available, we will publish individual Vulnerability Notes. In addition, more information about VU#999708 is available in US-CERT Technical Cyber Security Alert TA06-053A.
II. Impact
The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service.
III. Solution
Install an update
Install Apple Security Update 2006-001. This and other updates are available via Apple Update.
Disable "Open 'safe' files after downloading"
For additional protection, disable the option to "Open 'safe' files after downloading," as specified in "Securing Your Web Browser."
Appendix A. References
These vulnerabilities were reported in Apple Security Update 2006-001. Please see the Vulnerability Notes for individual reporter acknowledgements.
Feedback can be directed to the authors:
US-CERT Technical Staff.
Produced 2006 by US-CERT, a government organization. Terms of use
Revision History
March 3, 2006: Initial release, updated solution