About the security content of Xcode tools 3.1
This document describes the security content of Xcode tools 3.1.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates."
Xcode tools 3.1
CoreImage Examples
CVE-ID: CVE-2008-2304
Available for: Mac OS X v10.5.x
Impact: Opening a Fun House document may lead to an unexpected application termination or arbitrary code execution
Description: Xcode tools contain an example application called Core Image Fun House that handles content with the ".funhouse" extension. A buffer overflow may occur in this application when processing ".funhouse" files. Opening a maliciously-crafted ".funhouse" file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Kevin Finisterre of Netragard for reporting this issue.
WebObjects
CVE-ID: CVE-2008-2318
Available for: Mac OS X v10.5.x
Impact: WebObjects session IDs may be disclosed to other web sites
Description: WebObjects contains an API to generate URLs in HTML documents via the WOHyperlink dynamic element. When WOHyperlink is used, it always appends a session ID to the generated URL, even for absolute URLs. Using WOHyperlink to create URLs that point at other web sites may result in the disclosure of the current user's session ID to those sites. This update addresses the issue by appending session IDs to absolute URLs only when explicitly requested.
Important: Information about products not manufactured by Apple is provided for information purposes only and does not constitute Apple’s recommendation or endorsement. Please contact the vendor for additional information.