-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2008.0660 -- [OSX]
          Security Update 2008-004 and Mac OS X v10.5.4 released
                                1 July 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Alias Manager
                      CoreTypes
                      c++filt
                      Dock
                      Launch Services
                      Net-SNMP
                      Ruby
                      SMB File Server
                      System Configuration
                      Tomcat
                      VPN
                      WebKit
Publisher:            Apple
Operating System:     Mac OS X
Impact:               Execute Arbitrary Code/Commands
                      Access Privileged Data
                      Cross-site Scripting
                      Denial of Service
                      Provide Misleading Information
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-2726 CVE-2008-2725 CVE-2008-2664
                      CVE-2008-2663 CVE-2008-2662 CVE-2008-2314
                      CVE-2008-2313 CVE-2008-2311 CVE-2008-2310
                      CVE-2008-2309 CVE-2008-2308 CVE-2008-2307
                      CVE-2008-1145 CVE-2008-1105 CVE-2008-0960
                      CVE-2007-6276 CVE-2007-5461 CVE-2007-5333
                      CVE-2007-3385 CVE-2007-3383 CVE-2007-3382
                      CVE-2007-2450 CVE-2007-2449 CVE-2007-1355
                      CVE-2005-3164

Ref:                  ESB-2008.0622
                      ESB-2008.0641
                      AL-2008.0064
                      AA-2007.0092
                      ESB-2007.0629
                      ESB-2008.0659

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2008-06-30 Security Update 2008-004 and Mac OS X v10.5.4

Security Update 2008-004 and Mac OS X v10.5.4 are now available and
address the following issues:

Alias Manager
CVE-ID:  CVE-2008-2308
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact:  Resolving an alias containing maliciously crafted volume
mount information may lead to an unexpected application termination
or arbitrary code execution
Description:  A memory corruption issue exists in the handling of AFP
volume mount information in an alias data structure. Resolving an
alias containing maliciously crafted volume mount information may
lead to an unexpected application termination or arbitrary code
execution. This update addresses the issue by performing additional
validation of alias data structures. This issue only affects Intel-
based systems running Mac OS X 10.5.1 or earlier.

CoreTypes
CVE-ID:  CVE-2008-2309
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.3, Mac OS X Server v10.5 through v10.5.3
Impact:  Users are not warned before opening certain potentially
unsafe content types
Description:  This update adds .xht and .xhtm files to the system's
list of content types that will be flagged as potentially unsafe
under certain circumstances, such as when they are downloaded from a
web page. While these content types are not automatically launched,
if manually opened they could lead to the execution of a malicious
payload. This update improves the system's ability to notify users
before handling .xht and .xhtm files. On Mac OS X v10.4 this
functionality is provided by the Download Validation feature. On Mac
OS X v10.5 this functionality is provided by the Quarantine feature.
Credit to Brian Mastenbrook for reporting this issue.

c++filt
CVE-ID:  CVE-2008-2310
Available for:  Mac OS X v10.5 through v10.5.3,
Mac OS X Server v10.5 through v10.5.3
Impact:  Passing a maliciously crafted string to c++filt may lead to
an unexpected application termination or arbitrary code execution
Description:  A format string issue exists in c++filt, which is a
debugging tool used to demangle C++ and Java symbols. Passing a
maliciously crafted string to c++filt may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved handling of format strings. This
issue does not affect systems prior to Mac OS X 10.5.

Dock
CVE-ID:  CVE-2008-2314
Available for:  Mac OS X v10.5 through v10.5.3,
Mac OS X Server v10.5 through v10.5.3
Impact:  A person with physical access may be able to bypass the
screen lock
Description:  When the system is set to require a password to wake
from sleep or screen saver, and hot corners are set for Expose, a
person with physical access may be able to access the system without
entering a password. This update addresses the issue by disabling hot
corners when the screen lock is active. This issue does not affect
systems prior to Mac OS X 10.5. Credit to Andrew Cassell of Marine
Spill Response Corporation for reporting this issue.

Launch Services
CVE-ID:  CVE-2008-2311
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact:  Visiting a maliciously crafted website may lead to arbitrary
code execution
Description:  A race condition exists in the download validation of
symbolic links, when the target of the link changes during the narrow
time window of validation. If the "Open 'safe' files"
preference is enabled in Safari, visiting a maliciously crafted
website may cause a file to be opened on the user's system, resulting
in arbitrary code execution. This update addresses the issue by
performing additional validation of downloaded files. This issue does
not affect systems running Mac OS X 10.5 or later.

Net-SNMP
CVE-ID:  CVE-2008-0960
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.3, Mac OS X Server v10.5 through v10.5.3
Impact:  A remote attacker may be able to spoof an authenticated
SNMPv3 packet
Description:  An issue exists in Net-SNMP's SNMPv3 authentication,
which may allow maliciously crafted packets to bypass the
authentication check. This update addresses the issue by performing
additional validation of SNMPv3 packets. Additional information is
available via http://www.kb.cert.org/vuls/id/878044

Ruby
CVE-ID:  CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725,
CVE-2008-2726
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.3, Mac OS X Server v10.5 through v10.5.3
Impact:  Running a Ruby script that uses untrusted input to access
strings or arrays may lead to an unexpected application termination
or arbitrary code execution
Description:  Multiple memory corruption issues exist in Ruby's
handling of strings and arrays, the most serious of which may lead to
arbitrary code execution. This update addresses the issue by
performing additional validation of strings and arrays.

Ruby
CVE-ID:  CVE-2008-1145
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.3, Mac OS X Server v10.5 through v10.5.3
Impact:  If WEBRick is running, a remote attacker may be able to
access files protected by WEBrick's :NondisclosureName option
Description:  The :NondisclosureName option in the Ruby WEBrick
toolkit is used to restrict access to files. Requesting a file name
which uses unexpected capitalization may bypass the
:NondisclosureName restriction. This update addresses the issue by
additional validation of file names. Additional information is
available via http://www.ruby-lang.org/en/news/2008/03/03/webrick-
file-access-vulnerability/ The directory traversal issue described in
the advisory does not affect Mac OS X.

SMB File Server
CVE-ID:  CVE-2008-1105
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.3, Mac OS X Server v10.5 through v10.5.3
Impact:  A remote attacker may be able to cause an unexpected
application termination or arbitrary code execution
Description:  A heap buffer overflow exists in the handling of SMB
packets. Sending malicious SMB packets to a SMB server, or connecting
to a malicious SMB server, may lead to an unexpected application
termination or arbitrary code execution. This update addresses the
issue through improved bounds checking on the length of received SMB
packets. Credit to Alin Rad Pop of Secunia Research for reporting
this issue.

System Configuration
CVE-ID:  CVE-2008-2313
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact:  A local user may be able to execute arbitrary code with the
privileges of new users
Description:  A local user may be able to populate the User Template
directory with files that will become part of the home directory when
a new user is created. This could allow arbitrary code execution with
the privileges of the new user. This update addresses the issue by
applying more restrictive permissions on the User Template directory.
This issue does not affect systems running Mac OS X 10.5 or later.
Credit to Andrew Mortensen of the University of Michigan for
reporting this issue.

Tomcat
CVE-ID:  CVE-2005-3164, CVE-2007-1355, CVE-2007-2449, CVE-2007-2450,
CVE-2007-3382, CVE-2007-3383, CVE-2007-5333, CVE-2007-3385,
CVE-2007-5461
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact:  Multiple vulnerabilities in Tomcat 4.1.36
Description:  Tomcat version 4.x is bundled on Mac OS X v10.4.11
systems. Tomcat on Mac OS X v10.4.11 is updated to version 4.1.37 to
address several vulnerabilities, the most serious of which may lead
to a cross-site scripting attack. Further information is available
via the Tomcat site at http://tomcat.apache.org/ Tomcat version 6.x
is bundled with Mac OS X v10.5 systems.

VPN
CVE-ID:  CVE-2007-6276
Available for:  Mac OS X v10.5 through v10.5.3,
Mac OS X Server v10.5 through v10.5.3
Impact:  Remote attackers may be able to cause an unexpected
application termination
Description:  A divide by zero issue exists in the virtual private
network daemon's handling of load balancing information. Processing a
maliciously crafted UDP packet may lead to an unexpected application
termination. This issue does not lead to arbitrary code execution.
This update addresses the issue by performing additional validation
of load balancing information. This issue does not affect systems
prior to Mac OS X 10.5.

WebKit
CVE-ID:  CVE-2008-2307
Available for:  Mac OS X v10.5 through v10.5.3,
Mac OS X Server v10.5 through v10.5.3
Impact:  Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description:  A memory corruption issue exists in WebKit's handling
of JavaScript arrays. Visiting a maliciously crafted website may lead
to an unexpected application termination or arbitrary code execution.
This update addresses the issue through improved bounds checking.
Along with this fix, the version of Safari for Mac OS X v10.5.4 is
updated to 3.1.2. For Mac OS X v10.4.11 and Windows XP / Vista, this
issue is addressed in Safari v3.1.2 for those systems. Credit to
James Urquhart for reporting this issue.

Security Update 2008-004 and Mac OS X v10.5.4 may be obtained from
the Software Update pane in System Preferences, or Apple's Software
Downloads web site:
http://www.apple.com/support/downloads/

The Software Update utility will present the update that applies
to your system configuration. Only one is needed, either
Security Update 2008-004 or Mac OS X v10.5.4.

For Mac OS X v10.5.3
The download file is named:  "MacOSXUpd10.5.4.dmg"
Its SHA-1 digest is:  455d911a23ba222cc962298ad8ad15b2a234ca65

For Mac OS X v10.5 - v10.5.2
The download file is named:  "MacOSXUpdCombo10.5.4.dmg"
Its SHA-1 digest is:  490962bf712b2d801d08f42ca66b8a4541e9da16

For Mac OS X Server v10.5.3
The download file is named:  "MacOSXServerUpd10.5.4.dmg"
Its SHA-1 digest is:  bfeda72164fa17564b25d205d14288fe795df127

For Mac OS X Server v10.5 - v10.5.2
The download file is named:  "MacOSXServerUpdCombo10.5.4.dmg"
Its SHA-1 digest is:  d2d2fb234333c11348eb90f91d9d1720a952605a

For Mac OS X v10.4.11 (Intel)
The download file is named:  "SecUpd2008-004Intel.dmg"
Its SHA-1 digest is:  a14f144316eb620ccd28e12887e13ec0d6f46e6a

For Mac OS X v10.4.11 (PowerPC)
The download file is named:  "SecUpd2008-004PPC.dmg"
Its SHA-1 digest is:  b5436e04ce30392bc5131272f6b7f5582bc9fe27

For Mac OS X Server v10.4.11 (Universal)
The download file is named:  "SecUpdSrvr2008-004Univ.dmg"
Its SHA-1 digest is:  9b68b34f88ff8110166c1a57fd05756982f1e390

For Mac OS X Server v10.4.11 (PowerPC)
The download file is named:  "SecUpdSrvr2008-004PPC.dmg"
Its SHA-1 digest is:  35ef81cc092a74af80b2ef792c72645c636a4ae5

Information will also be posted to the Apple Security Updates
web site:  http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

- -----BEGIN PGP SIGNATURE-----
Version: 9.7.2.1608

wsBVAwUBSGk5pXkodeiKZIkBAQgzWwgAo3I2TgErwkXZMwlw9/Bk3uy//inoPSI5
2/WIC31SQgGF6S3ogzp7oDPApFvRyhZl4FMPulc2GL2UL9nJ5fSRF4JbKYmMqYyo
oF8D+rPbUUDUyx7tndZTcit+zHJ1OJU+LZ2QNkKX1NdsU0v6+Tv0dD8qEx6RhRuG
Nu+NZn8/3duceq/UzO+mir1HMIvXnGTYgGcj2L5SNauHla/XJtmARyfnCfDjE5c3
PUeHgvXJCLRIt/6a10RtbGcHWeY8tU2jCU/WmA41xUjdg3CkcDj6nbJfMn9t5PlU
knlC0rMoKBJiCBln3YX+DTWBp+xUhY7JAVOE8pBpWvmk98Ja8w4sLg==
=CXa3
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSGmJ5ih9+71yA2DNAQLjeQQAj3wiCLmmPBFRIwNoiX5i+dym/VNMaEHK
eMhhDNJQYwn4HSb9aaYka009myp+i7K8qQeArWBAmbvm6S5hoEPq0MilPbo/BSWd
m4pxxdeTrigUOr/089oQw/feYfOlXIT2IoozqLmCTGAB1Mvj9tzEnebzoBeveaKZ
muo9f0xsUIY=
=17rv
-----END PGP SIGNATURE-----