Archived - About the security content of Xsan Filesystem 1.4
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred, and any necessary patches or releases are available. To learn more about Apple Product Security, visit the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to Use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates."
Xsan Filesystem 1.4
Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
Impact: Malicious users may be able to cause systems using Xsan to crash or execute arbitrary code
Description: A buffer overflow may occur in the Xsan Filesystem driver when processing a path name. A malicious user with write access to an Xsan volume may be able to trigger the overflow on systems directly attached to Xsan. This could lead to a system crash or arbitrary code execution with system privileges. This update addresses the issue by performing additional validation of path names. Credit to Andrew Wellington of the Australian National University for reporting this issue.