SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   Apple OS X Vendors:   Apple
Mac OS X Lets Remote Users Execute Arbitrary Code, Deny Service, and Obtain Information
SecurityTracker Alert ID:  1024723
SecurityTracker URL:  http://securitytracker.com/id/1024723
CVE Reference:   CVE-2010-0105, CVE-2010-1803, CVE-2010-1828, CVE-2010-1829, CVE-2010-1830, CVE-2010-1831, CVE-2010-1832, CVE-2010-1833, CVE-2010-1834, CVE-2010-1836, CVE-2010-1837, CVE-2010-1838, CVE-2010-1840, CVE-2010-1841, CVE-2010-1842, CVE-2010-1843, CVE-2010-1844, CVE-2010-1845, CVE-2010-1846, CVE-2010-1847, CVE-2010-2249, CVE-2010-3783, CVE-2010-3784, CVE-2010-3785, CVE-2010-3786, CVE-2010-3797, CVE-2010-3798   (Links to External Site)
Date:  Nov 11 2010
Impact:   Denial of service via local system, Denial of service via network, Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.5.8, 10.6.4
Description:   Multiple vulnerabilities were reported in Mac OS X. A remote or remote authenticated user can execute arbitrary code on the target system. A remote or local user can cause denial of service conditions. A remote user can obtain potentially sensitive information.

A remote user can trigger a null pointer dereference and cause the target AFP Server to shutdown [CVE-2010-1828].

A remote authenticated user can exploit a directory traversal flaw to create files and cause arbitrary code execution [CVE-2010-1829].

A remote user can determine the existence of an AFP share [CVE-2010-1830].

A remote user can trigger a buffer overflow in AppKit [CVE-2010-1842]. Jesse Ruderman of Mozilla Corporation reported this vulnerability.

A remote user can create a specially crafted font, document, disk image, or web page that, when loaded by the target user, will execute arbitrary code [CVE-2010-1811, CVE-2010-1831, CVE-2010-1832, CVE-2010-1833, CVE-2010-1797, CVE-2010-1752, CVE-2010-1834, CVE-2010-1836, CVE-2010-1837, CVE-2010-1841, CVE-2010-1844, CVE-2010-1845, CVE-2010-1846, CVE-2010-3785, CVE-2010-3786, CVE-2010-3798].

Marc Schoenefeld of Red Hat, Christoph Diehl of Mozilla, Matias Eissler and Anibal Sacco of Core Security Technologies, Laurent OUDOT of TEHTRI-Security, Neil Fryer of IT Security Geeks, Andrew Kiss, Tobias Klein via iDefense VCP, Steven Fisher of Discovery Software Ltd., and Dominic Chell of NGSSoftware reported these vulnerabilities.

A local user can bypass the Directory Service password validation and login to a mobile account [CVE-2010-1838].

A remote user can trigger a stack buffer overflow in Directory Services in the validation of password data to execute arbitrary code [CVE-2010-1840]. Rodrigo Rubira Branco from Check Point Vulnerability Discovery Team (VDT) and Rainer Mueller reported this vulnerability.

A local user can exploit a flaw in diskdev_cmds to prevent the system from starting properly [CVE-2010-0105]. Maksymilian Arciemowicz of SecurityReason reported this vulnerability.

A local user can exploit a flaw in the handling of terminal devices to trigger a memory management error and cause the system to shutdown [CVE-2010-1847].

A remote user can send specially crafted Protocol Independent Multicast (PIM) packets to trigger a null pointer dereference and cause the target system to shutdown [CVE-2010-1843]. An anonymous researcher reported this vulnerability via TippingPoint's Zero Day Initiative.

A remote attacker can login with an outdated password due to a Password Server replication flaw [CVE-2010-3783].

A remote user can send specially crafted XML data to applications using the PMPageFormatCreateWithDataRepresentation API to trigger a null dereference and cause the target application to crash [CVE-2010-3784]. Wujun Li of Microsoft reported this vulnerability.

A remote attacker can access a target user's Time Machine information [CVE-2010-1803].

A remote user that can edit wiki pages can inject javascript to obtain the credentials of a target user [CVE-2010-3797].

Impact:   A remote user or remote authenticated user can execute arbitrary code on the target system.

A remote or local user can cause denial of service conditions.

A local user can login to a mobile account.

A remote user can obtain Time Machine information.

A remote user can obtain a target user's Wiki Server credentials.

Solution:   Apple has issued a fix as part of Mac OS X v10.6.5 and Security Update 2010-007, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

The Software Update utility will present the update that applies
to your system configuration. Only one is needed, either
Security Update 2010-007 or Mac OS X v10.6.5.

For Mac OS X v10.6.4
The download file is named: MacOSXUpd10.6.5.dmg
Its SHA-1 digest is: ccd856d0672394fd80c6873a8f43c6739708b44f

For Mac OS X v10.6 - v10.6.3
The download file is named: MacOSXUpdCombo10.6.5.dmg
Its SHA-1 digest is: add336a1af1c3914887d2217fbbc98b18e6fb57c

For Mac OS X Server v10.6.4
The download file is named: MacOSXServerUpd10.6.5.dmg
Its SHA-1 digest is: fc1158e9e526e387cd37d6ecea76ae1ecc284eeb

For Mac OS X Server v10.6 - v10.6.3
The download file is named: MacOSXServUpdCombo10.6.5.dmg
Its SHA-1 digest is: 1317084400ea9b11f44d30cf3723ce991346b360

For Mac OS X v10.5.8
The download file is named: SecUpd2010-007.dmg
Its SHA-1 digest is: 50ff8cb66104cd2a01b66677864619e0fbed4d98

For Mac OS X Server v10.5.8
The download file is named: SecUpdSrvr2010-007.dmg
Its SHA-1 digest is: e6e9ea9cf97ae02d78560dbce4c7c2620321b21b

The vendor's advisory is available at:

http://support.apple.com/kb/HT4435

Vendor URL:  support.apple.com/kb/HT4435 (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 23 2010 (Apple Issues Fix for Apple TV) Mac OS X Lets Remote Users Execute Arbitrary Code, Deny Service, and Obtain Information
Apple has issued a fix for Apple TV.
Jul 25 2011 (Apple Issues Fix for iWork) Mac OS X Lets Remote Users Execute Arbitrary Code, Deny Service, and Obtain Information
Apple has issued a fix for Apple iWork.
Sep 21 2011 (VMware Issues Fix for Workstation/Player) Mac OS X Lets Remote Users Execute Arbitrary Code, Deny Service, and Obtain Information
VMware has issued a fix for Workstation and Player.
Oct 13 2011 (Apple Issues Fix for Numbers for iOS) Mac OS X Lets Remote Users Execute Arbitrary Code, Deny Service, and Obtain Information
Apple has issued a fix for Apple Numbers for iOS.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2016, SecurityGlobal.net LLC