Skip to comments.
Apple releases Security Update 2009-005 for Mac OS X 10.4 Tiger and 10.5 Leopard
Mac Daily News ^
| 09/12/2009
Posted on 09/11/2009 11:20:39 PM PDT by Swordmaker
Friday, September 11, 2009 - 10:22 AM EDTApple has released Security Update 2009-005 for Mac OS X 10.4 Tiger, 10.4 Server (Tiger), 10.5 Leopard, and 10.5 Server (Leopard).
Security Update 2009-005 is recommended for all users and improves the security of Mac OS X. Previous security updates have been incorporated into this security update.
Security Update 2009-005 is available via Software Update and also via standalone installers.
More info and download links:
Security Update 2009-005 (Leopard) - 93.14MB
Security Update 2009-005 Server (Leopard) - 181MB
Security Update 2009-005 (Tiger Intel) - 169.75MB
Security Update 2009-005 (Tiger PPC) - 77.95MB
Security Update 2009-005 Server (Tiger Univ) - 206.43MB
Security Update 2009-005 Server (Tiger PPC) - 132.53MB
TOPICS: Computers/Internet
KEYWORDS: appleupdate; spammer
For those who are NOT using Snow Leopard, here is a security update for OSX.4 Tiger and OSX.5 Leopard...
To: ~Kim4VRWC's~; 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; Aliska; altair; ...
For those who are NOT using Snow Leopard, here is a security update for OSX.4 Tiger and OSX.5 Leopard... PING!

Mac Tiger and Leopard Security Update Ping!
If you want on or off the Mac Ping List, Freepmail me.
2
posted on
09/11/2009 11:22:02 PM PDT
by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
To: All
Summary
This document describes Security Update 2009-005, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates."
Products Affected
Product Security, Mac OS X Server 10.5, Mac OS X Server 10.4.x (Universal), Mac OS X Server 10.4.x (PowerPC), Mac OS X 10.5.8 , Mac OS X 10.4.11
Security Update 2009-005
-
Alias Manager
CVE-ID: CVE-2009-2800
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Opening a maliciously crafted alias file may lead to an unexpected application termination or arbitrary code execution
Description: A buffer overflow exists in the handling of alias files. Opening a maliciously crafted alias file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. This issue does not affect Mac OS X v10.6 systems. Credit: Apple.
-
CarbonCore
CVE-ID: CVE-2009-2803
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Opening a file with a maliciously crafted resource fork may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue exists in the Resource Manager's handling of resource forks. Opening a file with a maliciously crafted resource fork may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved validation of resource forks. This issue does not affect Mac OS X v10.6 systems. Credit: Apple.
-
ClamAV
CVE-ID: CVE-2009-1241, CVE-2009-1270, CVE-2008-6680, CVE-2009-1371, CVE-2009-1372
Available for: Mac OS X Server v10.5.8
Impact: Multiple vulnerabilities in ClamAV 0.94.2
Description: Multiple vulnerabilities exist in ClamAV 0.94.2, the most serious of which may lead to arbitrary code execution. This update addresses the issues by updating ClamAV to version 0.95.2. ClamAV is distributed only with Mac OS X Server systems. Further information is available via the ClamAV website at http://www.clamav.net/ These issues do not affect Mac OS X v10.6 systems.
-
ColorSync
CVE-ID: CVE-2009-2804
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Viewing a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution
Description: An integer overflow exists in the handling of images with an embedded ColorSync profile, which may lead to a heap buffer overflow. Opening a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of ColorSync profiles. This issue does not affect Mac OS X v10.6 systems. Credit: Apple.
-
CoreGraphics
CVE-ID: CVE-2009-2805
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution
Description: An integer overflow in CoreGraphics' handling of PDF files may result in a heap buffer overflow. Opening a PDF file containing a maliciously crafted JBIG2 stream may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Will Dormann of CERT/CC for reporting this issue. This issue does not affect Mac OS X v10.6 systems.
-
CoreGraphics
CVE-ID: CVE-2009-2468
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A heap buffer overflow exists in the drawing of long text strings. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. This issue does not affect Mac OS X v10.6 systems. Credit to Will Drewry of Google Inc. for reporting this issue.
-
CUPS
CVE-ID: CVE-2009-0949
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: A remote attacker may be able to deny access to the Printer Sharing service
Description: A null pointer dereference exists in CUPS. By repeatedly sending maliciously crafted scheduler requests, a remote attacker may be able to deny access to the Printer Sharing service. This update addresses the issue through improved validation of scheduler requests. This issue does not affect Mac OS X v10.6 systems. Credit to Anibal Sacco of the CORE IMPACT Exploit Writing Team (EWT) at Core Security Technologies for reporting this issue.
-
CUPS
CVE-ID: CVE-2009-2807
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: An uprivileged local user may be able to obtain system privileges
Description: A heap buffer overflow exists in the CUPS USB backend. This may allow a local user to obtain system privileges. This update addresses the issue through improved bounds checking. This issue does not affect systems prior to Mac OS X v10.5, or Mac OS X v10.6 systems.
-
Flash Player plug-in
CVE-ID: CVE-2009-1862, CVE-2009-1863, CVE-2009-1864, CVE-2009-1865, CVE-2009-1866, CVE-2009-1867, CVE-2009-1868, CVE-2009-1869, CVE-2009-1870
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Multiple vulnerabilities in Adobe Flash Player plug-in
Description: Multiple issues exist in the Adobe Flash Player plug-in, the most serious of which may lead to arbitrary code execution when viewing a maliciously crafted web site. The issues are addressed by updating the Flash Player plug-in on Mac OS v10.5.8 to version 10.0.32.18, and to version 9.0.246.0 on Mac OS X v10.4.11 systems. For Mac OS X v10.6 systems, these issues are addressed in Mac OS X v10.6.1. Further information is available via the Adobe web site at http://www.adobe.com/support/security/bulletins/apsb09-10.html
-
ImageIO
CVE-ID: CVE-2009-2809
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Viewing a maliciously crafted PixarFilm encoded TIFF image may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues exist in ImageIO's handling of PixarFilm encoded TIFF images. Viewing a maliciously crafted PixarFilm encoded TIFF image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through additional validation of PixarFilm encoded TIFF images. This issue does not affect Mac OS X v10.6 systems. Credit: Apple.
-
Launch Services
CVE-ID: CVE-2009-2811
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Attempting to open unsafe downloaded content may not lead to a warning
Description: This update adds '.fileloc' to the system's list of content types that will be flagged as potentially unsafe under certain circumstances, such as when they are downloaded from an e-mail. While these content types are not automatically opened, if manually opened they could lead to the execution of a malicious payload. This update improves the system's ability to notify users before handling '.fileloc' files. This issue does not affect Mac OS X v10.6 systems. Credit: Apple.
-
Launch Services
CVE-ID: CVE-2009-2812
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Visiting a malicious website may lead to arbitrary code execution
Description: When an application is downloaded, Launch Services analyzes its exported document types. A design issue in the handling of the exported document types may cause Launch Services to associate a safe file extension with an unsafe Uniform Type Identifier (UTI). Visiting a malicious website may cause an unsafe file type to be opened automatically. This update addresses the issue through improved handling of exported document types from untrusted applications. This issue does not affect systems prior to Mac OS X v10.5, or Mac OS X v10.6 systems. Credit: Apple.
-
MySQL
CVE-ID: CVE-2008-2079
Available for: Mac OS X Server v10.5.8
Impact: MySQL is updated to version 5.0.82
Description: MySQL is updated to version 5.0.82 to address an implementation issue that allows a local user to obtain elevated privileges. This issue only affects Mac OS X Server systems. This issue does not affect Mac OS X v10.6 systems. Further information is available via the MySQL web site at http://dev.mysql.com/doc/refman/5.0/en/news-5-0-82.html
-
PHP
CVE-ID: CVE-2009-1271, CVE-2009-1272, CVE-2009-0590, CVE-2009-0591, CVE-2009-0789, CVE-2008-5498
Available for: Mac OS X v10.5, Mac OS X Server v10.5.8
Impact: Multiple vulnerabilities in PHP 5.2.8
Description: PHP is updated to version 5.2.10 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP website at http://www.php.net/ These issues do not affect Mac OS X v10.6 systems.
-
SMB
CVE-ID: CVE-2009-2813
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Enabling Windows File Sharing may share folders unexpectedly
Description: An unchecked error condition exists in Samba. A user who does not have a configured home directory, and connects to the Windows File Sharing service, will be able to access the contents of the file system, subject to local file system permissions. This update addresses the issue by improving the handling of path resolution errors. This issue does not affect systems prior to Mac OS X v10.5, or Mac OS X v10.6 systems. Credit to J. David Hester of LCG Systems National Institutes of Health for reporting this issue.
-
Wiki Server
CVE-ID: CVE-2009-2814
Available for: Mac OS X Server v10.5.8
Impact: A remote attacker may gain access to Wiki Server user accounts
Description: A cross site scripting issue exists in the Wiki Server's handling of search requests containing non-UTF-8 encoded data. This may allow a remote attacker to access a Wiki server with the credentials of the Wiki Server user performing the search. This update addresses the issue by setting UTF-8 as the default character set in HTTP responses. This issue does not affect systems prior to Mac OS X v10.5, or Mac OS X v10.6 systems. Credit: Apple.
3
posted on
09/11/2009 11:25:45 PM PDT
by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson