-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2011.1126
    Java for Mac OS X 10.7 Update 1 and Java for Mac OS X 10.6 Update 6
                              9 November 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          Java
Publisher:        Apple
Operating System: Mac OS X
Impact/Access:    Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:       Patch/Upgrade
CVE Names:        CVE-2011-3561 CVE-2011-3560 CVE-2011-3558
                  CVE-2011-3557 CVE-2011-3556 CVE-2011-3554
                  CVE-2011-3553 CVE-2011-3552 CVE-2011-3551
                  CVE-2011-3549 CVE-2011-3548 CVE-2011-3547
                  CVE-2011-3546 CVE-2011-3545 CVE-2011-3544
                  CVE-2011-3521 CVE-2011-3389 

Reference:        ASB-2011.0092

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2011-11-08-1 Java for Mac OS X 10.7 Update 1 and Java for Mac
OS X 10.6 Update 6

Java for Mac OS X 10.7 Update 1 and Java for Mac OS X 10.6 Update 6
are now available and address the following:

Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
Mac OS X v10.7.2, Mac OS X Server v10.7.2
Impact: Multiple vulnerabilities in Java 1.6.0_26
Description: Multiple vulnerabilities exist in Java 1.6.0_26, the
most serious of which may allow an untrusted Java applet to execute
arbitrary code outside the Java sandbox. Visiting a web page
containing a maliciously crafted untrusted Java applet may lead to
arbitrary code execution with the privileges of the current user.
These issues are addressed by updating to Java version 1.6.0_29.
Further information is available via the Java website at
http://java.sun.com/javase/6/webnotes/ReleaseNotes.html
CVE-ID
CVE-2011-3389
CVE-2011-3521
CVE-2011-3544
CVE-2011-3545
CVE-2011-3546
CVE-2011-3547
CVE-2011-3548
CVE-2011-3549
CVE-2011-3551
CVE-2011-3552
CVE-2011-3553
CVE-2011-3554
CVE-2011-3556
CVE-2011-3557
CVE-2011-3558
CVE-2011-3560
CVE-2011-3561

Java for Mac OS X 10.7 Update 1 and Java for Mac OS X 10.6 Update 6
may be obtained from the Software Update pane in System Preferences,
or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

For Mac OS X v10.6 systems
The download file is named: JavaForMacOSX10.6.dmg
Its SHA-1 digest is: be0ac75b8bac967f1d39a94ebf9482a61fb7d70b

For Mac OS X v10.7 systems
The download file is named: JavaForMacOSX10.7.dmg
Its SHA-1 digest is: 7768e6aeb5adaa638c74d4c04150517ed99fed20

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.16 (Darwin)

iQEcBAEBAgAGBQJOuZNKAAoJEGnF2JsdZQeece8H/1I98YQ1LF4iDD442zB+WjZP
2Vxd3euXYwySD6qDCYNLJ0hUKu90c/4nr5d5rRH3xYdBzAHuZG39m069lpN1UZIW
t5ube+j9zjiejnXlPbAgq+vIAg22nu0EdxhOOZZeQOoEYqyoKhXNCt3fR+tzo3o4
mN/LWMO1NwrM0sGDPuUGs2TWdPZbC4QJJz4Z4S+FsTlujYh9MRd3dyxLBIg7BKCL
wgnFdpFW8bPmVdiTj91pC0Gb3XtolQxexXGHsdI15KeFMbQ06nKV/AyvxMF8O5jS
D089GEHE52NAQCZ0YJ6TJsisrGqTZZ77js55cPU259FogxEKKBuwfdFbn4qVeD8=
=4KBF
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=VXtu
-----END PGP SIGNATURE-----