-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
ESB-2004.0391 -- APPLE-SA-2004-06-07
Security Update 2004-06-07
08 June 2004
AusCERT Security Bulletin Summary
Operating System: Mac OS X v10.3.4 "Panther"
Mac OS X Server v10.3.4 "Panther"
Mac OS X v10.2.8 "Jaguar"
Mac OS X Server v10.2.8 "Jaguar"
Impact: Execute Arbitrary Code/Commands
Access Required: Remote
CVE Names: CAN-2004-0538
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
APPLE-SA-2004-06-07 Security Update 2004-06-07
Security Update 2004-06-07 delivers a number of security enhancements
and is recommended for all Macintosh users. The purpose of this
update is to increase security by alerting you when opening an
application for the first time via document mappings or a web address
(URL). For more details, including a description of the new alert
dialog box, please see:
Versions: Security Update 2004-06-07 is available for the following
* Mac OS X v10.3.4 "Panther"
* Mac OS X Server v10.3.4 "Panther"
* Mac OS X v10.2.8 "Jaguar"
* Mac OS X Server v10.2.8 "Jaguar"
The following components are updated:
Impact: LaunchServices automatically registers applications,
which could be used to cause the system to run unexpected
Discussion: LaunchServices is a system component that discovers and
opens applications. This system component has been modified to only
open applications that have previously been explicitly run on the
system. Attempts to run an application that has not previously been
explicitly run will result in a user alert. Further information is
available in http://docs.info.apple.com/article.html?artnum=25785
CVE-ID: No CVE ID has been reserved as this is only an
additional preventative measure.
Impact: The disk:// URI type mounts an anonymous remote file
system using the http protocol.
Discussion: The registration of the disk:// URI type is removed
from the system as a preventative measure against attempts to
automatically mount remote disk image file systems.
Impact: The "Show in Finder" button would open certain
files, in some cases executing downloaded applications.
Discussion: The "Show in Finder" button will now reveal files in a
Finder window and will no longer attempt to open them. This
modification is only available for Mac OS X v10.3.4 "Panther" and Mac
OS X Server v10.3.4 "Panther" systems as the issue does not apply to
Mac OS X v10.2.8 "Jaguar" or Mac OS X Server v10.2.8 "Jaguar".
CVE-ID: Not applicable
Impact: Attempts to use a telnet:// URI with an alternate port
Discussion: A modification has been made to allow the specification
of an alternate port number in a telnet:// URI. This restores
functionality that was removed with the recent fix for CAN-2004-0485.
Security Update 2004-06-07 may be obtained from:
* Software Update pane in System Preferences
* Apple's Software Downloads web site:
For Mac OS X v10.3.4 "Panther" and Mac OS X Server v10.3.4
Click on: Security Update 2004-06-07 (10.3.4)
The download file is named: "SecUpd2004-06-07Pan.dmg"
Its SHA-1 digest is: 182745485d8db3ea29ec67cb603cc5668a4f60d9
For Mac OS X v10.2.8 "Jaguar" and Mac OS X Server v10.2.8
Click on: Security Update 2004-06-07 (10.2.8)
The download file is named: "SecUpd2004-06-07Jag.dmg"
Its SHA-1 digest is: e5fa73f6a67bdcd9af76927d3416974f039b2087
Information will also be posted to the Apple Product Security
This message is signed with Apple's Product Security PGP key,
and details are available at:
- -----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to email@example.com
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
Internet Email: firstname.lastname@example.org
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call after hours
for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----