Impression Mise à jour de la MAJ de sécurité du 2004-09-07 
Mise à Jour PantherVoici la mise à jour de la mise à jour de sécurité rendue disponible mardi dernier par Apple. Cette mise à jour de mise à jour est numérotée 1.1. Tout comme la précédente, elle corrige les mêmes problèmes. Et comme c'est la même, il vous faudra une nouvelle fois télécharger 7,6Mo pour pouvoir l'installer. De plus, et parce que c'était comme ça lors de la première version, cette mise à jour est aussi proposé à tous ceux qui tournent avec Mac OS X 10.3.4, ou Mac OS X 10.2.8, ou bien, avec les versions serveurs respectives.

Et pour finir, cette mise à jour de la mise à jour est disponible via le module de mise à jour des logiciels, ou directement sur le site d'Apple
Cette mise à jour de la mise à jour précédente, corrige donc toujours les mêmes services de Mac OS X. Mais lesquels, me direz-vous ?

La mise à jour Security Update 2004-09-07 apporte un certain nombre d’améliorations en termes de sécurité ; elle est recommandée à tous les utilisateurs de Macintosh.

Cette mise à jour inclut les éléments suivants :
  • CoreFoundation
  • IPSec
  • Kerberos
  • libpcap
  • lukemftpd
  • NetworkConfig
  • OpenLDAP
  • OpenSSH
  • PPPDialer
  • rsync
  • Safari
  • tcpdump

Pour obtenir des informations détaillées sur cette mise à jour, consultez le site Web suivant : http://www.info.apple.com/kbnum/n61798


Vous pouvez télécharger directement ce patch ici :













Voici quelques explications concernant la mise à jour pour Mac OS X 10.3.5 :

Security Update 2004-09-07 v.1.1(10.3.5 Client)

About Security Update
Security Update 2004-09-07 delivers a number of security enhancements and is recommended for all Macintosh users.

Security Update 2004-09-07 v1.1 fixes the following issues in Security Update 2004-09-07 v1.0:
- lukemftpd: Corrects the path to the configuration directory
- Safari (10.3.5 only): The Safari version number is changed to provide compatibility with web sites that use an old version-checking mechanism

Systems that have already installed Security Update 2004-09-07 v1.0 should install Security Update 2004-09-07 v1.1 to obtain these fixes.

Security Update 2004-09-07 v1.1 is available for Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5, Mac OS X Server v10.2.8, Mac OS X Server v10.3.4, and Mac OS X Server v10.3.5.

SHA 1 = ee5e3f7f0b04e7e31cce45bf3437bbe17be10a8b

This update includes the following components:

CoreFoundation

IPSec
Kerberos
libpcap
lukemftpd
NetworkConfig
OpenLDAP
OpenSSH
PPPDialer
rsync
Safari
tcpdump

For detailed information on this Update, please visit this website :
http://www.info.apple.com/kbnum/n61798



Et comme vous mourez d'envie de savoir ce qui se cache derrière cette mise à jour, voici le détail pour chaque élément :

Security Update 2004-09-07

This Security Update is available for the following system versions:
- Mac OS X 10.3.4
- Mac OS X 10.3.5
- Mac OS X Server 10.3.4
- Mac OS X Server 10.3.5
- Mac OS X 10.2.8
- Mac OS X Server 10.2.8

Tip: For more information about CVE-IDs referenced below, see :
http://www.cve.mitre.org/.

▪ Component: Apache 2
CVE-IDs: CAN-2004-0493, CAN-2004-0488
Available for: Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: Exposure to a potential Denial of Service.
Description: The Apache Organization has released Apache version 2.0.50. This release fixes a number of denial of service vulnerabilities. We have updated Apache to version 2.0.50 which only ships with Mac OS X Server, and is off by default.

▪ Component: CoreFoundation
CVE-ID: CAN-2004-0821
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: Privileged programs using CoreFoundation can be made to load a user supplied library.
Description: Bundles using the CoreFoundation CFPlugIn facilities can include directions to automatically load plugin executables. With a specially crafted bundle this could also occur for privileged programs, permitting a local privilege escalation. CoreFoundation now prevents automatic executable loading for bundles that already have a loaded executable. Credit to Kikuchi Masashi <kik@ms.u-tokyo.ac.jp> for reporting this issue.

▪ Component: CoreFoundation
CVE-ID: CAN-2004-0822
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: An environment variable can be manipulated to cause a buffer overflow which can result in a privilege escalation
Description: By manipulating an environment variable a program could potentially be made to execute arbitrary code by a local attacker. This can only be exploited with access to a local account. Stricter validity checks are now performed for this environment variable. Credit to <aaron@vtty.com> for reporting this issue.

▪ Component: IPSec
CVE-ID: CAN-2004-0607
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: When using certificates, unauthenticated hosts may be able to negotiate an IPSec connection.
Description: When configured to use X.509 certificates to authenticate remote hosts, a certificate verification failure does not abort the key exchange. Mac OS X does not use certificates for IPSec by default so this issue only affects configurations that have been manually configured. IPSec now verifies and aborts a key exchange if a certificate verification failure occurs.

▪ Component: Kerberos
CVE-ID: CAN-2004-0523
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier could permit remote attackers to execute arbitrary code.
Description: The buffer overflow can only be exploited if "auth_to_local_names" or "auth_to_local" support is also configured in the edu.mit.Kerberos file. Apple does not enable this by default. The security fix was back ported and applied to the Mac OS X versions of Kerberos. The Mac OS X and Mac OS X Server version of Kerberos is not susceptible to the recent "double-free" issue reported in the CERT vulnerability note VU#350792 (CAN-2004-0772). Credit to the MIT Kerberos Development Team for informing us of this issue.

▪ Component: lukemftpd
CVE-ID: CAN-2004-0794
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: A race condition that can permit an authenticated remote attacker to cause a denial of service or execute arbitrary code
Description: If the FTP service has been enabled, and a remote attacker can correctly authenticate, then a race condition would permit them to stop the FTP service or execute arbitary code. The fix is to replace the lukemftpd FTP service with tnftpd. lukemftp is installed but not activated in Mac OS X Server, which instead uses xftp. Credit to Luke Mewburn of the NetBSD Foundation for informing us of this issue.

▪ Component: OpenLDAP
CVE-ID: CAN-2004-0823
Available for: Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: A crypt password can be used as if it were a plain text password.
Description: Backwards compatibility with older LDAP implementations permits the storing of a crypt password in the userPassword attribute. Some authentication validation schemes can use this value as if it were a plain text password. The fix removes the ambiguity and always uses this type of field as a crypt password. This issue does not occur in Mac OS X 10.2.8. Credit to Steve Revilak of Kayak Software Corporation for reporting this issue.

▪ Component: OpenSSH
CVE-ID: CAN-2004-0175
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: A malicious ssh/scp server can overwrite local files
Description: A directory traversal vulnerability in the scp program permits a malicious remote server to overwrite local files. The security fix was backported and applied to the Mac OS X versions of OpenSSH.

▪ Component: PPPDialer
CVE-ID: CAN-2004-0824
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: A malicious user can overwrite system files resulting in a local privilege escalation
Description: PPP components performed insecure accesses of a file stored in a world-writeable location. The fix moves the log files to a non-world-writeable location.

▪ Component: QuickTime Streaming Server
Available for: Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
CVE-ID: CAN-2004-0825
Impact: A denial of service requiring a restart of the QuickTime Streaming Server
Description: A particular sequence of client operations can cause a deadlock on the QuickTime Streaming Server. The fix updates the code to eliminate this deadlock condition.

▪ Component: rsync
CVE-ID: CAN-2004-0426
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: When rsync is run in daemon mode a remote attacker can write outside of the module path unless the chroot option has been set.
Description: rsync before version 2.6.1 does not properly sanitize paths when running a read/write daemon with the chroot option turned off. The fix updates rsync to version 2.6.2.

▪ Component: Safari
CVE-ID: CAN-2004-0361
Available for: Mac OS X 10.2.8, Mac OS X Server 10.2.8
Impact: A JavaScript array of negative size can cause Safari to access out of bounds memory resulting in an application crash.
Description: Storing objects into a JavaScript array allocated with negative size can overwrite memory. Safari now stops processing JavaScript programs if an array allocation fails.
This security enhancement was previously made available in Safari 1.0.3, and is being applied inside the Mac OS X 10.2.8 operating system as an extra layer of protection for customers who have not installed that version of Safari. This is a specific fix for Mac OS X 10.2.8 and the issue does not exist in Mac OS X 10.3 or later systems.

▪ Component: Safari
CVE-ID: CAN-2004-0720
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: An untrusted web site can inject content into a frame intended to be used by another domain.
Description: A web site that uses multiple frames can have some of its frames replaced with content from a malicious site if the malicious site is visited first. The fix imposes a set of parent/child rules preventing the attack.

▪ Component: SquirrelMail
CVE-ID: CAN-2004-0521
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL statements
Description: SquirrelMail before 1.4.3 RC1 is vulnerable to SQL injection which permits unauthorized SQL statements to be run. The fix updates SquirrelMail to version 1.4.3a

▪ Component: tcpdump
CVE-IDs: CAN-2004-0183, CAN-2004-0184
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: Maliciously crafted packets can cause a crash of a running tcpdump
Description: The detailed printing functions for ISAKMP packets do not perform correct bounds checking and cause an out-of-bounds read which results in a crash. The fix updates tcpdump to version 3.8.3. 
Thiery
Posté le : Mar. - Septembre 14, 2004 à 06:53 PM

| | | |