Cette mise à jour de la mise à jour précédente, corrige donc toujours les mêmes services de
Mac OS X. Mais lesquels, me direz-vous ?
La mise à jour Security Update 2004-09-07 apporte un certain nombre d’améliorations en termes de sécurité ; elle est recommandée à tous les utilisateurs de Macintosh.
Cette
mise à jour inclut les éléments
suivants :
CoreFoundation
IPSec
Kerberos
libpcap
lukemftpd
NetworkConfig
OpenLDAP
OpenSSH
PPPDialer
rsync
Safari
tcpdump
Pour obtenir des informations détaillées sur cette mise à jour, consultez le site Web suivant :
http://www.info.apple.com/kbnum/n61798 Vous
pouvez télécharger directement ce patch
ici :
Voici
quelques explications concernant la mise à jour pour Mac OS X 10.3.5
:
Security Update 2004-09-07 v.1.1(10.3.5 Client)
About Security Update Security Update 2004-09-07
delivers a number of security enhancements and is recommended for all Macintosh
users.
Security Update 2004-09-07 v1.1 fixes the following issues in
Security Update 2004-09-07 v1.0:
- lukemftpd: Corrects the path to the
configuration directory
- Safari (10.3.5 only): The Safari version number
is changed to provide compatibility with web sites that use an old
version-checking mechanism
Systems that have already installed
Security Update 2004-09-07 v1.0 should install Security Update 2004-09-07 v1.1
to obtain these fixes.
Security Update 2004-09-07 v1.1 is available
for Mac OS X v10.2.8, Mac OS X v10.3.4, Mac OS X v10.3.5, Mac OS X Server
v10.2.8, Mac OS X Server v10.3.4, and Mac OS X Server v10.3.5.
SHA 1
= ee5e3f7f0b04e7e31cce45bf3437bbe17be10a8b
This update includes the
following components:
CoreFoundation
IPSec
Kerberos
libpcap
lukemftpd
NetworkConfig
OpenLDAP
OpenSSH
PPPDialer
rsync
Safari
tcpdump
For detailed
information on this Update, please visit this website :
http://www.info.apple.com/kbnum/n61798Et
comme vous mourez d'envie de savoir ce qui se cache derrière cette mise
à jour, voici le détail pour chaque élément
:
Security Update 2004-09-07This Security Update
is available for the following system versions:
- Mac OS X 10.3.4
-
Mac OS X 10.3.5
- Mac OS X Server 10.3.4
- Mac OS X Server
10.3.5
- Mac OS X 10.2.8
- Mac OS X Server 10.2.8
Tip: For
more information about CVE-IDs referenced below, see :
http://www.cve.mitre.org/.
▪
Component: Apache 2CVE-IDs: CAN-2004-0493,
CAN-2004-0488
Available for: Mac OS X Server 10.2.8, Mac OS X Server
10.3.4, Mac OS X Server 10.3.5
Impact: Exposure to a potential Denial of
Service.
Description: The Apache Organization has released Apache version
2.0.50. This release fixes a number of denial of service vulnerabilities. We
have updated Apache to version 2.0.50 which only ships with Mac OS X Server, and
is off by default.
▪ Component:
CoreFoundationCVE-ID: CAN-2004-0821
Available for: Mac OS X
10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X
Server 10.3.4, Mac OS X Server 10.3.5
Impact: Privileged programs using
CoreFoundation can be made to load a user supplied library.
Description:
Bundles using the CoreFoundation CFPlugIn facilities can include directions to
automatically load plugin executables. With a specially crafted bundle this
could also occur for privileged programs, permitting a local privilege
escalation. CoreFoundation now prevents automatic executable loading for bundles
that already have a loaded executable. Credit to Kikuchi Masashi
<kik@ms.u-tokyo.ac.jp> for reporting this issue.
▪
Component: CoreFoundationCVE-ID: CAN-2004-0822
Available for:
Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac
OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: An environment variable
can be manipulated to cause a buffer overflow which can result in a privilege
escalation
Description: By manipulating an environment variable a program
could potentially be made to execute arbitrary code by a local attacker. This
can only be exploited with access to a local account. Stricter validity checks
are now performed for this environment variable. Credit to
<aaron@vtty.com> for reporting this issue.
▪
Component: IPSecCVE-ID: CAN-2004-0607
Available for: Mac OS X
10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X
Server 10.3.4, Mac OS X Server 10.3.5
Impact: When using certificates,
unauthenticated hosts may be able to negotiate an IPSec
connection.
Description: When configured to use X.509 certificates to
authenticate remote hosts, a certificate verification failure does not abort the
key exchange. Mac OS X does not use certificates for IPSec by default so this
issue only affects configurations that have been manually configured. IPSec now
verifies and aborts a key exchange if a certificate verification failure
occurs.
▪ Component: KerberosCVE-ID:
CAN-2004-0523
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X
10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server
10.3.5
Impact: Multiple buffer overflows in krb5_aname_to_localname for MIT
Kerberos 5 (krb5) 1.3.3 and earlier could permit remote attackers to execute
arbitrary code.
Description: The buffer overflow can only be exploited if
"auth_to_local_names" or "auth_to_local" support is also configured in the
edu.mit.Kerberos file. Apple does not enable this by default. The security fix
was back ported and applied to the Mac OS X versions of Kerberos. The Mac OS X
and Mac OS X Server version of Kerberos is not susceptible to the recent
"double-free" issue reported in the CERT vulnerability note VU#350792
(CAN-2004-0772). Credit to the MIT Kerberos Development Team for informing us of
this issue.
▪ Component: lukemftpdCVE-ID:
CAN-2004-0794
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X
10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server
10.3.5
Impact: A race condition that can permit an authenticated remote
attacker to cause a denial of service or execute arbitrary
code
Description: If the FTP service has been enabled, and a remote
attacker can correctly authenticate, then a race condition would permit them to
stop the FTP service or execute arbitary code. The fix is to replace the
lukemftpd FTP service with tnftpd. lukemftp is installed but not activated in
Mac OS X Server, which instead uses xftp. Credit to Luke Mewburn of the NetBSD
Foundation for informing us of this issue.
▪ Component:
OpenLDAPCVE-ID: CAN-2004-0823
Available for: Mac OS X 10.3.4, Mac
OS X 10.3.5, Mac OS X Server 10.3.4, Mac OS X Server 10.3.5
Impact: A crypt
password can be used as if it were a plain text password.
Description:
Backwards compatibility with older LDAP implementations permits the storing of a
crypt password in the userPassword attribute. Some authentication validation
schemes can use this value as if it were a plain text password. The fix removes
the ambiguity and always uses this type of field as a crypt password. This issue
does not occur in Mac OS X 10.2.8. Credit to Steve Revilak of Kayak Software
Corporation for reporting this issue.
▪ Component:
OpenSSHCVE-ID: CAN-2004-0175
Available for: Mac OS X 10.2.8, Mac
OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4,
Mac OS X Server 10.3.5
Impact: A malicious ssh/scp server can overwrite
local files
Description: A directory traversal vulnerability in the scp
program permits a malicious remote server to overwrite local files. The security
fix was backported and applied to the Mac OS X versions of
OpenSSH.
▪ Component: PPPDialerCVE-ID:
CAN-2004-0824
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X
10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server
10.3.5
Impact: A malicious user can overwrite system files resulting in a
local privilege escalation
Description: PPP components performed insecure
accesses of a file stored in a world-writeable location. The fix moves the log
files to a non-world-writeable location.
▪ Component:
QuickTime Streaming ServerAvailable for: Mac OS X Server 10.2.8, Mac
OS X Server 10.3.4, Mac OS X Server 10.3.5
CVE-ID:
CAN-2004-0825
Impact: A denial of service requiring a restart of the
QuickTime Streaming Server
Description: A particular sequence of client
operations can cause a deadlock on the QuickTime Streaming Server. The fix
updates the code to eliminate this deadlock condition.
▪
Component: rsyncCVE-ID: CAN-2004-0426
Available for: Mac OS X
10.2.8, Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X
Server 10.3.4, Mac OS X Server 10.3.5
Impact: When rsync is run in daemon
mode a remote attacker can write outside of the module path unless the chroot
option has been set.
Description: rsync before version 2.6.1 does not
properly sanitize paths when running a read/write daemon with the chroot option
turned off. The fix updates rsync to version 2.6.2.
▪
Component: SafariCVE-ID: CAN-2004-0361
Available for: Mac OS X
10.2.8, Mac OS X Server 10.2.8
Impact: A JavaScript array of negative size
can cause Safari to access out of bounds memory resulting in an application
crash.
Description: Storing objects into a JavaScript array allocated with
negative size can overwrite memory. Safari now stops processing JavaScript
programs if an array allocation fails.
This security enhancement was
previously made available in Safari 1.0.3, and is being applied inside the Mac
OS X 10.2.8 operating system as an extra layer of protection for customers who
have not installed that version of Safari. This is a specific fix for Mac OS X
10.2.8 and the issue does not exist in Mac OS X 10.3 or later
systems.
▪ Component: SafariCVE-ID:
CAN-2004-0720
Available for: Mac OS X 10.2.8, Mac OS X 10.3.4, Mac OS X
10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS X Server
10.3.5
Impact: An untrusted web site can inject content into a frame
intended to be used by another domain.
Description: A web site that uses
multiple frames can have some of its frames replaced with content from a
malicious site if the malicious site is visited first. The fix imposes a set of
parent/child rules preventing the attack.
▪ Component:
SquirrelMailCVE-ID: CAN-2004-0521
Available for: Mac OS X 10.2.8,
Mac OS X 10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server
10.3.4, Mac OS X Server 10.3.5
Impact: SquirrelMail before 1.4.3 RC1 allows
remote attackers to execute unauthorized SQL statements
Description:
SquirrelMail before 1.4.3 RC1 is vulnerable to SQL injection which permits
unauthorized SQL statements to be run. The fix updates SquirrelMail to version
1.4.3a
▪ Component: tcpdumpCVE-IDs:
CAN-2004-0183, CAN-2004-0184
Available for: Mac OS X 10.2.8, Mac OS X
10.3.4, Mac OS X 10.3.5, Mac OS X Server 10.2.8, Mac OS X Server 10.3.4, Mac OS
X Server 10.3.5
Impact: Maliciously crafted packets can cause a crash of a
running tcpdump
Description: The detailed printing functions for ISAKMP
packets do not perform correct bounds checking and cause an out-of-bounds read
which results in a crash. The fix updates tcpdump to version 3.8.3.