[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 782/06 - Apple - Security Update to Address Multiple Vulnerabilities



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------------------------
       UNIRAS (UK Government CERT) Briefing - 782/06 Dated 29.11.06 Time 11:30 

UNIRAS is part of NISCC (the UK National Infrastructure Security  Co-ordination Centre)
- - ---------------------------------------------------------------------------------------
 	UNIRAS material is available from the NISCC website at www.niscc.gov.uk
- - ---------------------------------------------------------------------------------------

Title
=====
US-CERT Technical Cyber Security Alert TA06-333A 

Apple Releases Security Update to Address Multiple Vulnerabilities

Detail
======

- - -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                   National Cyber Alert System

            Technical Cyber Security Alert TA06-333A


Apple Releases Security Update to Address Multiple Vulnerabilities

   Original release date: November 29, 2006
   Last revised: --
   Source: US-CERT


Systems Affected

     * Apple Mac OS X version 10.3.x and 10.4.x
     * Apple Mac OS X Server version 10.3.x and 10.4.x
     * Apple Safari web browser

   These vulnerabilities affect both Intel-based and PowerPC-based Apple
   systems.


Overview

   Apple has released Security Update 2006-007 to correct multiple
   vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web
   browser. Vulnerabilities in OpenSSL, gzip, and other products are also
   addressed. The most serious of these vulnerabilities may allow a
   remote attacker to execute arbitrary code. Attackers may take
   advantage of the less serious vulnerabilities to bypass security
   restrictions or cause a denial of service.


I. Description

   Apple Security Update 2006-007 addresses a number of vulnerabilities
   affecting Mac OS X, OS X Server, Safari web browser, and other
   products. Further details are available in the related vulnerability
   notes.

   This security update also addresses previously known vulnerabilities
   in PHP, Perl, OpenSSL, and gzip, which are shipped with Mac OS X. The
   OpenSSL vulnerabilities are documented in multiple vulnerability
   notes. Information is also available through the OpenSSL
   vulnerabilities page. Information about the vulnerabilities in gzip is
   available in a series of vulnerability notes.


II. Impact

   The impacts of these vulnerabilities vary. For specific details, see
   the appropriate vulnerability notes. Potential consequences include
   remote execution of arbitrary code or commands, bypass of security
   restrictions, and denial of service.


III. Solution

Install updates

   Install Apple Security Update 2006-007. This and other updates are
   available via Apple Update or via Apple Downloads.


IV. References

     * Vulnerability Notes for Apple Security Update 2006-007 -
       <http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-007>

     * Vulnerability Notes for OpenSSL Security Advisory [28th September
       2006] -
<http://www.kb.cert.org/vuls/byid?searchview&query=openssl_secadv_20060928>

     * Vulnerability Note VU#845620 -
       <http://www.kb.cert.org/vuls/id/845620>

     * Vulnerability Note VU#933712 -
       <http://www.kb.cert.org/vuls/id/933712>

     * Vulnerability Note VU#381508 -
       <http://www.kb.cert.org/vuls/id/381508>

     * Vulnerability Note VU#554780 -
       <http://www.kb.cert.org/vuls/id/554780>

     * Vulnerability Note VU#596848 -
       <http://www.kb.cert.org/vuls/id/596848>

     * Vulnerability Note VU#773548 -
       <http://www.kb.cert.org/vuls/id/773548>

     * About the security content of Security Update 2006-007 -
       <http://docs.info.apple.com/article.html?artnum=304829>

     * Mac OS X: Updating your software -
       <http://docs.info.apple.com/article.html?artnum=106704>

     * Apple Downloads - <http://www.apple.com/support/downloads/>

     * OpenSSL: OpenSSL vulnerabilities -
       <http://www.openssl.org/news/vulnerabilities.html>

     * Securing Your Web Browser -
       <http://www.us-cert.gov/reading_room/securing_browser/#Safari>

 _________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA06-333A.html>
 _________________________________________________________________

 Feedback can be directed to US-CERT Technical Staff. Please send  

 email to <cert@xxxxxxxx> with "TA06-333A Feedback VU#191336" 

 in the  subject.
 _________________________________________________________________

 Produced 2006 by US-CERT, a government organization.

 Terms of use:

   <http://www.us-cert.gov/legal.html>

 _________________________________________________________________

   Revision History

   November 29, 2006: Initial release

- - -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRW33NuxOF3G+ig+rAQJtiggApJKRh7x+z8vp0xb26sE16RUOD3epcrk6
lJZ4rXnqVqoFacAt0Ucb8T43/Uc4N85UMa695YbFspYZum3hcGZo+WnNPolGUeRz
iN/4bfKgzekfpbHxf6T3YvQYp+PVMRfHPUcxfaZDYXhu2813N4SSQpM59KRL5BD7
xr+5VvB09biVKlzpEdgtk2EHcqc+sMF5+o3cCgDJCnJNL+NG4J6d/hsyNP15ekTf
8m0W4rJonUe2gR2Bp7F1Y47KgRr3BT1aH2gxUSim9qEJpPdP/CkmGoFp+BfrFP9q
A580LOrqFK8HIly1fbPKb26p2theUUESnQqM9Ob8xolkCDLy6h7ssg==
=f7N+
- - -----END PGP SIGNATURE-----
- - ---------------------------------------------------------------------------------------
NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
   (Place an 'X' next to your choice)

	Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
- - ---------------------------------------------------------------------------------------

For additional information or assistance, please contact our help desk by telephone.  
You may send Not Protectively Marked information via e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

- - ---------------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Apple and US-CERT for the information 

contained in this briefing.
- - ---------------------------------------------------------------------------------------

This notice contains information released by the original author. Some of the information may have changed since it was released. If
the vulnerability affects you, it may be prudent to retrieve the advisory from the site of the original source to ensure that you
receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not
constitute or imply its endorsement, recommendation, or favouring by UNIRAS or NISCC. The views and opinions of authors expressed
within this notice shall not be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors or omissions contained within this briefing notice. In
particular, they shall not be liable for any loss or damage whatsoever, arising from or in connection with the usage of information
contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) and has contacts with other international Incident
Response Teams (IRTs) in order to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents,
and to promote information sharing amongst its members and the community at large.
- - ---------------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRW7BPGl7oeQsXfKvEQJ/HgCdFHEhyaAkgnRafchPbqAdoAfKY7QAn1lF
fTErnXXWARFDsiDXSI0qPo3Y
=LiRE
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________