About the security content of AirPort Time Capsule and AirPort Base Station (802.11n) Firmware 7.6
This document describes the security content of AirPort Time Capsule and AirPort Base Station (802.11n) Firmware 7.6.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates".
AirPort Time Capsule and AirPort Base Station (802.11n) Firmware 7.6
Available for: AirPort Extreme Base Station with 802.11n, AirPort Express Base Station with 802.11n, AirPort Time Capsule
Impact: An attacker in a privileged network position may be able to cause arbitrary command execution via malicious DHCP responses
Description: dhclient allowed remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message. This issue is addressed by stripping shell metacharacters in dhclient-script.
CVE-2011-0997 : Sebastian Krahmer and Marius Tomaschewski of the SUSE Security Team working with ISC
Installation note for Firmware version 7.6
Firmware version 7.6 is installed into AirPort Time Capsule or AirPort Base Station with 802.11n via AirPort Utility, provided with the device.
It is recommended that AirPort Utility 5.5.3 or later be installed before upgrading to Firmware version 7.6.
AirPort Utility 5.5.3 or later may be obtained through Apple's Software Download site: http://www.apple.com/support/downloads/