About the security content of Security Update 2008-003/Mac OS X 10.5.3
This document describes the security content of Security Update 2008-003/Mac OS X 10.5.3, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.
For the protection of our customers, Apple does not disclose, discuss or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To find out more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key".
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To find out about other Security Updates, see "Apple Security Updates".
Security Update 2008-003/Mac OS X v10.5.3
AFP Server
CVE-ID: CVE-2008-1027
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: files that are not designated for sharing may be accessed remotely.
Description: AFP Server did not check that a file or directory to be served was inside a folder designated for sharing. A connected user or guest may access any files or folders for which they have permission, even if not contained in folders designated for sharing. This update addresses the issue by denying access to files and folders that are not inside a folder designated for sharing. Credit to Alex deVries and Robert Rich for reporting this issue.
Apache
CVE-ID: CVE-2005-3352, CVE-2005-3357, CVE-2006-3747, CVE-2007-1863, CVE-2007-3847, CVE-2007-4465, CVE-2007-5000, CVE-2007-6388
Available for: Mac OS X Server v10.4.11
Impact: multiple vulnerabilities in Apache 2.0.55
Description: Apache is updated to version 2.0.63 to address several vulnerabilities, the most serious of which may lead to cross-site scripting. Further information is available via the Apache website at http://httpd.apache.org. Apache 2.0.x is only sent with Mac OS X Server v10.4.x systems. Mac OS X v10.5.x and Mac OS X Server v10.5.x sent with Apache 2.2.x. The issues that affected Apache 2.2.x were addressed in Security Update 2008-002 for Mac OS X v10.5.2 and Mac OS X Server v10.5.2.
AppKit
CVE-ID: CVE-2008-1028
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact: opening a maliciously crafted file may lead to an unexpected application termination or arbitrary code execution.
Description: an implementation issue exists in AppKit's processing of document files. Opening a maliciously crafted file in an editor that uses AppKit, such as TextEdit, may cause an unexpected application termination or arbitrary code execution. This update addresses the issue through improved validation of document files. This issue does not affect systems running Mac OS X 10.5 or later. Credit to Rosyna of Unsanity for reporting this issue.
Apple Pixlet Video
CVE-ID: CVE-2008-1577
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: opening a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution.
Description: multiple memory corruption issues exist in the handling of files using the Pixlet codec. Opening a maliciously crafted movie file may cause an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking.
ATS
CVE-ID: CVE-2008-1575
Available for: Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: printing a PDF document containing a maliciously crafted embedded font may lead to arbitrary code execution.
Description: a memory corruption issue exists in the Apple Type Services server's handling of embedded fonts in PDF files. Printing a PDF document containing a maliciously crafted font may lead to arbitrary code execution. This update addresses the issue by performing additional validation of embedded fonts. This issue does not affect systems prior to Mac OS X v10.5. Credit to Melissa O'Neill of Harvey Mudd College for reporting this issue.
CFNetwork
CVE-ID: CVE-2008-1580
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information.
Description: an information disclosure issue exists in Safari's SSL client certificate handling. When a web server issues a client certificate request, the first client certificate found in the keychain is automatically sent, which may lead to the disclosure of the information contained in the certificate. This update addresses the issue by prompting the user before sending the certificate.
CoreFoundation
CVE-ID: CVE-2008-1030
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: applications' use of the CFData API in certain ways may lead to an unexpected application termination or arbitrary code execution.
Description: an integer overflow in CoreFoundation's handling of CFData objects may result in a heap buffer overflow. An application calling CFDataReplaceBytes with an with invalid length argument may unexpectedly terminate or lead to arbitrary code execution. This update addresses the issue by performing additional validation of length parameters.
CoreGraphics
CVE-ID: CVE-2008-1031
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.
Description: an uninitialised variable issue exists in CoreGraphics' handling of PDF files. Opening a maliciously crafted PDF file may cause an unexpected application termination or arbitrary code execution. This update addresses the issue through proper initialisation of pointers.
CoreTypes
CVE-ID: CVE-2008-1032
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: users are not warned before opening certain potentially unsafe content types.
Description: this update extends the system's list of content types that will be flagged as potentially unsafe under certain circumstances, such as when they are downloaded from a web page. While these content types are not automatically launched, if manually opened they could lead to the execution of a malicious payload. This update improves the system's ability to notify users before handling content types used by Automator, Help, Safari and Terminal. On Mac OS X v10.4 this functionality is provided by the Download Validation feature. On Mac OS X v10.5 this functionality is provided by the Quarantine feature. Credit to Brian Mastenbrook for reporting this issue.
CUPS
CVE-ID: CVE-2008-1033
Available for: Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: printing to password-protected printers with debug logging enabled may lead to the disclosure of sensitive information.
Description: an issue exists in the CUPS scheduler's check of the authentication environment variables when debug logging has been enabled. This may lead to the disclosure of the username, domain and password when printing to a password-protected printer. This update addresses the issue by properly validating environment variables. This issue does not affect systems prior to Mac OS X v10.5 with Security Update 2008-002 installed.
Flash Player Plug-in
CVE-ID: CVE-2007-5275, CVE-2007- 6243, CVE-2007- 6637, CVE-2007-6019, CVE-2007-0071, CVE-2008-1655, CVE-2008-1654
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: opening maliciously crafted Flash content may lead to arbitrary code execution.
Description: multiple issues exist in Adobe Flash Player Plug-in, the most serious of which may lead to arbitrary code execution. This update addresses the issue by updating to version 9.0.124.0. Further information is available via the Adobe website at http://www.adobe.com/support/security/bulletins/apsb08-11.html
Help Viewer
CVE-ID: CVE-2008-1034
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact: a malicious help:topic URL may cause an unexpected application termination or arbitrary code execution.
Description: an integer underflow in Help Viewer's handling of help:topic URLs may result in a buffer overflow. Accessing a malicious help:topic URL may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. This issue does not affect systems running Mac OS X 10.5 or later. Credit to Paul Haddad of PTH Consulting for reporting this issue.
iCal
CVE-ID: CVE-2008-1035
Available for: Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: opening a maliciously crafted iCalendar file in iCal may lead to an unexpected application termination or arbitrary code execution.
Description: a use-after-free issue exists in the iCal application's handling of iCalendar (usually ".ics") files. Opening a maliciously crafted iCalendar file in iCal may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by improving reference counting in the affected code. This issue does not affect systems prior to Mac OS X v10.5. Credit to Rodrigo Carvalho of Core Security Technologies for reporting this issue.
International Components for Unicode
CVE-ID: CVE-2008-1036
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: visiting certain websites may result in the disclosure of sensitive information.
Description: a conversion issue exists in ICU's handling of certain character encodings. Particular invalid character sequences may not appear in the converted output, and this can affect content filters. Visiting a maliciously crafted website may lead to cross-site scripting and the disclosure of sensitive information. This update addresses the issue by replacing invalid character sequences with a fallback character.
Image Capture
CVE-ID: CVE-2008-1571
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact: accessing a maliciously crafted URL may lead to information disclosure.
Description: a path traversal issue exists in Image Capture's embedded web server. This may lead to the disclosure of local files on the server system. This update addresses the issue through improved URL handling. This issue does not affect systems running Mac OS X v10.5 or later.
Image Capture
CVE-ID: CVE-2008-1572
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact: a local user may manipulate files with the privileges of another user running Image Capture.
Description: an insecure file operation exists in Image Capture's handling of temporary files. This could allow a local user to overwrite files with the privileges of another user running Image Capture, or to access the contents of images being resized. This update addresses the issue through improved handling of temporary files. This issue does not affect systems running Mac OS X v10.5 or later.
ImageIO
CVE-ID: CVE-2008-1573
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: viewing a maliciously crafted BMP or GIF image may lead to information disclosure.
Description: an out-of-bounds memory read may occur in the BMP and GIF image decoding engine, which may lead to the disclosure of content in memory. This update addresses the issue by performing additional validation of BMP and GIF images. Credit to Gynvael Coldwind of Hispasec for reporting this issue.
ImageIO
CVE-ID: CVE-2007-5266, CVE-2007-5268, CVE-2007-5269
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: multiple vulnerabilities in libpng version 1.2.18
Description: multiple vulnerabilities exist in libpng version 1.2.18, the most serious of which may lead to a remote denial of service. This update addresses the issue by updating to version 1.2.24. Further information is available via the libpng website at http://www.libpng.org/pub/png/libpng.html
ImageIO
CVE-ID: CVE-2008-1574
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: viewing a maliciously crafted JPEG2000 image file may lead to an unexpected application termination or arbitrary code execution.
Description: an integer overflow in the handling of JPEG2000 image files may result in a heap buffer overflow. Viewing a maliciously crafted JPEG2000 image file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through additional validation of JPEG2000 images.
Kernel
CVE-ID: CVE-2008-0177
Available for: Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: a remote attacker may be able to cause to an unexpected system shutdown.
Description: an undetected failure condition exists in the handling of packets with an IPComp header. By sending a maliciously crafted packet to a system configured to use IPSec or IPv6, an attacker may cause an unexpected system shutdown. This update addresses the issue by properly detecting the failure condition.
Kernel
CVE-ID: CVE-2007-6359
Available for: Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: a local user may be able to cause an unexpected system shutdown.
Description: a null pointer dereference exists in the kernel's handling of code signatures in the cs_validate_page function. This may allow a local user to cause an unexpected system shutdown. This update addresses the issue by performing additional validation of code signatures. This issue does not affect systems prior to Mac OS X v10.5.
LoginWindow
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact: managed Client preferences may not be applied.
Description: this update addresses a non-security issue introduced in Security Update 2007-004. Due to a race condition, LoginWindow may fail to apply certain preferences to fail on systems managed by Managed Client for Mac OS X (MCX). This update addresses the issue by eliminating the race condition in the handling of managed preferences. This issue does not affect systems running Mac OS X v10.5.
CVE-ID: CVE-2008-1576
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact: sending emails through an SMTP server over IPv6 may lead to an unexpected application termination, information disclosure or arbitrary code execution.
Description: an uninitialised buffer issue exists in Mail. When sending emails through an SMTP server over IPv6, Mail may use a buffer containing partially uninitialised memory, which could result in the disclosure of sensitive information to message recipients and email server administrators. This could also potentially lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by properly initialising the variable. This issue does not affect systems running Mac OS X v10.5 or later. Credit to Derek Morr of The Pennsylvania State University for reporting this issue.
ruby
CVE-ID: CVE-2007-6612
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: a remote attacker may be able to read arbitrary files.
Description: Mongrel is updated to version 1.1.4 to address a directory traversal issue in DirHandler, which may lead to the disclosure of sensitive information. Further information is available via the Mongrel website at http://rubyforge.org/projects/mongrel/.
Single Sign-On
CVE-ID: CVE-2008-1578
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact: passwords supplied to sso_util are exposed to other local users.
Description: the sso_util command-line tool required that passwords be passed to it in its arguments, potentially exposing the passwords to other local users. Passwords exposed include those for users, administrators and the KDC administration password. This update makes the password parameter optional, and sso_util will prompt for the password if needed. Credit to Geoff Franks of Hauptman Woodward Institute for reporting this issue.
Wiki Server
CVE-ID: CVE-2008-1579
Available for: Mac OS X Server v10.5 through v10.5.2
Impact: a remote attacker may determine valid user names on servers with the Wiki Server enabled.
Description: an information disclosure issue exists in Wiki Server when a nonexistent blog has been accessed. Using the information in the error message, an attacker may deduce the existence of local user names. This update addresses the issue through improved handling of error messages. This issue does not affect systems prior to Mac OS X v10.5. Credit to Don Rainwater of the University of Cincinnati for reporting this issue.
Important: mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple only provides this as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information.