Languages

Archived - About the security content of Xsan Filesystem 1.4

This article has been archived and is no longer updated by Apple.

This document describes the security content of Xsan Filesystem 1.4, which can be downloaded and installed using Software Update, or from Apple Downloads.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred, and any necessary patches or releases are available. To learn more about Apple Product Security, visit the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to Use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates."

Xsan Filesystem 1.4

  • Xsan

    CVE-ID: CVE-2006-3506

    Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7

    Impact: Malicious users may be able to cause systems using Xsan to crash or execute arbitrary code

    Description: A buffer overflow may occur in the Xsan Filesystem driver when processing a path name. A malicious user with write access to an Xsan volume may be able to trigger the overflow on systems directly attached to Xsan. This could lead to a system crash or arbitrary code execution with system privileges. This update addresses the issue by performing additional validation of path names. Credit to Andrew Wellington of the Australian National University for reporting this issue.

Last Modified: Feb 20, 2012
  • Last Modified: Feb 20, 2012
  • Article: TA24300
  • Views:

    2295

Additional Product Support Information