-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0368
        Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8
                               13 April 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Java
Publisher:         Apple
Operating System:  Mac OS X
Impact/Access:     Reduced Security -- Remote with User Interaction
Resolution:        Patch/Upgrade

Reference:         ESB-2012.0339

Original Bulletin: 
   http://support.apple.com/kb/HT5242

Comment: As a security hardening measure, the Java browser plugin and Java Web 
         Start are deactivated if they are unused for 35 days.
         
         A malware removal tool is included in this update that will remove the 
         most common variants of the Flashback malware.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2012-04-12-1 Java for OS X 2012-003 and
Java for Mac OS X 10.6 Update 8

Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8 is now
available and addresses the following:

Java
Available for:  OS X Lion v10.7.3, OS X Lion Server v10.7.3
Impact:  The Java browser plugin and Java Web Start are deactivated
if they remain unused for 35 days
Description:  As a security hardening measure, the Java browser
plugin and Java Web Start are deactivated if they are unused for 35
days. Installing this update will automatically deactivate the Java
browser plugin and Java Web Start. Users may re-enable Java if they
encounter Java applets on a web page or Java Web Start applications.
Further information is available at
http://support.apple.com/kb/HT5242

Java
Available for:  Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7.3, OS X Lion Server v10.7.3
Impact:  A Flashback malware removal tool will be run
Description:  This update runs a malware removal tool that will
remove the most common variants of the Flashback malware. If the
Flashback malware is found, it presents a dialog notifying the user
that malware was removed. There is no indication to the user if
malware is not found.

Note: These updates include the security content from Java for
OS X 2012-002 and Java for Mac OS X 10.6 Update 7.


Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8
may be obtained from the Software Update pane in System Preferences,
or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

For Mac OS X v10.6 systems
The download file is named: JavaForMacOSX10.6.dmg
Its SHA-1 digest is: e1da5dc40607eef88bff66a43ba5cdf6ac570225

For OS X Lion systems
The download file is named: JavaForOSX.dmg
Its SHA-1 digest is: 4e6fce49e9a3e07533398af8d8b0327136feead5

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.16 (Darwin)

iQEcBAEBAgAGBQJPhwt0AAoJEGnF2JsdZQeeX0YIAJaHtT3P9U42kxSZmOmoPc7c
7lHPEJTZCUthZqVThC6IA26USosTUnU0gCuVACS6cVzA9qx8aHamwqRtZxCUe2Of
qvioELGS2/YImnMB5cnfazg7PxWxkETWn0HCKMZMvxOGdDeJqGqideb1cf98h5ci
HLAdkZilgxQMSMIfx7YZUEOT2Wo+LSQPM2vRe3aexqbDyShXrj6aieHNowZQMdaF
rxVLHWxE4wP6+wsxVue7/yOK6L88L+r+PFtk2e91gVLFV6ZKZW8M9X9k5IoejkdN
dik49/HCTrlPQURJ36TxeA9QZF1TTuuH3GepjhyUB5vPSBZF3rR8Sja7mD0jtx0=
=UBlv
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBT4d4MO4yVqjM2NGpAQLzUhAAqnoynSr+WKux2kn9ChGeXEgl9+gbdidP
jiSQ+YCNr/9HmqP0EVMEPMzJHQ6eUINMCyXyXYWTFRPi8er9soSSlLP64arYoBRf
Q8ymdUJCnRiqfid23RZd8W4TMfrsuPrgFnELE84x6edpKAGydKGLgbKueKeGlYDj
SWbcN7bjGSMDV4HKvC6ZRvPwZHZKBHZuEauTe52bdMBjcudlgadLpg9uZxjIxgZU
u3cstLURHO/+Uamy0r7TiO7CxAaJZL16lRO31uyG7y0SwUijrFWP1AUu4wIQVwNq
MHZo9FM/JAbrIBFXStpx9atY/9lp63n/OeDa/wHytETpOh34HVazXaI8o9D39zzz
FaIeL999CGe31pv0ONdboamGXlnLCpEuFsZuN30KgsgesmQ6hRa4CngTgwUFK60Y
F9C2lPB4KZBfNV1cP8rDok54EmCGquuc5OYcftSk74dqQTNKwf0IwzhSgDFj4p1i
fEsOVEQyrNr2a/ZuaBcKqQq6Abm0mWV3jxHQ09cJpgaY/inTqxuS8vCpy0qtxwUB
68izcf4bedkT4g7jaCxUdivChcxqJCMi6GN2WZXlewt4pp/7CZqnzxJ4sZFplqXI
eQ8f8jsZCQ1rCNLZvbR/59qk0xsnB/4GasY6xyxltQRoVEAj2DLlk2cooy1AlChS
NFK1K9I03DE=
=Y00T
-----END PGP SIGNATURE-----