Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2012.0368 Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8 13 April 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Java Publisher: Apple Operating System: Mac OS X Impact/Access: Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade Reference: ESB-2012.0339 Original Bulletin: http://support.apple.com/kb/HT5242 Comment: As a security hardening measure, the Java browser plugin and Java Web Start are deactivated if they are unused for 35 days. A malware removal tool is included in this update that will remove the most common variants of the Flashback malware. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-04-12-1 Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8 Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8 is now available and addresses the following: Java Available for: OS X Lion v10.7.3, OS X Lion Server v10.7.3 Impact: The Java browser plugin and Java Web Start are deactivated if they remain unused for 35 days Description: As a security hardening measure, the Java browser plugin and Java Web Start are deactivated if they are unused for 35 days. Installing this update will automatically deactivate the Java browser plugin and Java Web Start. Users may re-enable Java if they encounter Java applets on a web page or Java Web Start applications. Further information is available at http://support.apple.com/kb/HT5242 Java Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.3, OS X Lion Server v10.7.3 Impact: A Flashback malware removal tool will be run Description: This update runs a malware removal tool that will remove the most common variants of the Flashback malware. If the Flashback malware is found, it presents a dialog notifying the user that malware was removed. There is no indication to the user if malware is not found. Note: These updates include the security content from Java for OS X 2012-002 and Java for Mac OS X 10.6 Update 7. Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ For Mac OS X v10.6 systems The download file is named: JavaForMacOSX10.6.dmg Its SHA-1 digest is: e1da5dc40607eef88bff66a43ba5cdf6ac570225 For OS X Lion systems The download file is named: JavaForOSX.dmg Its SHA-1 digest is: 4e6fce49e9a3e07533398af8d8b0327136feead5 Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ - -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin) iQEcBAEBAgAGBQJPhwt0AAoJEGnF2JsdZQeeX0YIAJaHtT3P9U42kxSZmOmoPc7c 7lHPEJTZCUthZqVThC6IA26USosTUnU0gCuVACS6cVzA9qx8aHamwqRtZxCUe2Of qvioELGS2/YImnMB5cnfazg7PxWxkETWn0HCKMZMvxOGdDeJqGqideb1cf98h5ci HLAdkZilgxQMSMIfx7YZUEOT2Wo+LSQPM2vRe3aexqbDyShXrj6aieHNowZQMdaF rxVLHWxE4wP6+wsxVue7/yOK6L88L+r+PFtk2e91gVLFV6ZKZW8M9X9k5IoejkdN dik49/HCTrlPQURJ36TxeA9QZF1TTuuH3GepjhyUB5vPSBZF3rR8Sja7mD0jtx0= =UBlv - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBT4d4MO4yVqjM2NGpAQLzUhAAqnoynSr+WKux2kn9ChGeXEgl9+gbdidP jiSQ+YCNr/9HmqP0EVMEPMzJHQ6eUINMCyXyXYWTFRPi8er9soSSlLP64arYoBRf Q8ymdUJCnRiqfid23RZd8W4TMfrsuPrgFnELE84x6edpKAGydKGLgbKueKeGlYDj SWbcN7bjGSMDV4HKvC6ZRvPwZHZKBHZuEauTe52bdMBjcudlgadLpg9uZxjIxgZU u3cstLURHO/+Uamy0r7TiO7CxAaJZL16lRO31uyG7y0SwUijrFWP1AUu4wIQVwNq MHZo9FM/JAbrIBFXStpx9atY/9lp63n/OeDa/wHytETpOh34HVazXaI8o9D39zzz FaIeL999CGe31pv0ONdboamGXlnLCpEuFsZuN30KgsgesmQ6hRa4CngTgwUFK60Y F9C2lPB4KZBfNV1cP8rDok54EmCGquuc5OYcftSk74dqQTNKwf0IwzhSgDFj4p1i fEsOVEQyrNr2a/ZuaBcKqQq6Abm0mWV3jxHQ09cJpgaY/inTqxuS8vCpy0qtxwUB 68izcf4bedkT4g7jaCxUdivChcxqJCMi6GN2WZXlewt4pp/7CZqnzxJ4sZFplqXI eQ8f8jsZCQ1rCNLZvbR/59qk0xsnB/4GasY6xyxltQRoVEAj2DLlk2cooy1AlChS NFK1K9I03DE= =Y00T -----END PGP SIGNATURE-----