About the security content of Java for Mac OS X 10.6 Update 1

This document describes the security content of Java for Mac OS X 10.6 Update 1.

Dieser Artikel wurde archiviert und wird von Apple nicht mehr aktualisiert.

This document describes the security content of Java for Mac OS X 10.6 Update 1, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates."

Java for Mac OS X 10.6 Update 1

  • Java

    CVE-ID: CVE-2009-3869, CVE-2009-3871, CVE-2009-3875, CVE-2009-3874, CVE-2009-3728, CVE-2009-3872, CVE-2009-3868, CVE-2009-3867, CVE-2009-3884, CVE-2009-3873, CVE-2009-3877, CVE-2009-3865, CVE-2009-3866

    Available for: Mac OS X v10.6.2 and later, Mac OS X Server v10.6.2 and later

    Impact: Multiple vulnerabilities in Java 1.6.0_15

    Description: Multiple vulnerabilities exist in Java 1.6.0_15, the most serious of which may allow an untrusted Java applet to obtain elevated privileges. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_17. Further information is available via the Sun Java website at http://www.oracle.com/technetwork/java/javase/releasenotes-136954.html.  Credit to Kevin Finisterre of Netragard for reporting CVE-2009-3867 to Apple.

  • Java

    CVE-ID: CVE-2009-2843

    Available for: Mac OS X v10.6.2 and later, Mac OS X Server v10.6.2 and later

    Impact: An expired certificate for a Java applet is treated as valid

    Description: An expired certificate for a Java applet is treated as valid. This issue is addressed through improved handling of expired certificates. Credit to Simon Heimlicher of ETH Zurich for reporting this issue.

Veröffentlichungsdatum: 2016-01-28