-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0547
        Java for OS X 2012-004 and Java for Mac OS X 10.6 Update 9
                               13 June 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Java for OS X
Publisher:         Apple
Operating System:  Mac OS X
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-1725 CVE-2012-1724 CVE-2012-1723
                   CVE-2012-1722 CVE-2012-1721 CVE-2012-1719
                   CVE-2012-1718 CVE-2012-1716 CVE-2012-1713
                   CVE-2012-1711 CVE-2012-0551 

Reference:         ASB-2012.0085

Original Bulletin: 
   http://support.apple.com/kb/HT5319

Comment: http://www.oracle.com/technetwork/java/javase/releasenotes-136954.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2012-06-12-1 Java for OS X 2012-004 and Java for
Mac OS X 10.6 Update 9

Java for OS X 2012-004 and Java for Mac OS X 10.6 Update 9 is now
available and addresses the following:

Java
Available for:  Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7.4, OS X Lion Server v10.7.4
Impact:  Multiple vulnerabilities in Java
Description:  Multiple vulnerabilities exist in Java, the most
serious of which may allow an untrusted Java applet to execute
arbitrary code outside the Java sandbox. Visiting a web page
containing a maliciously crafted untrusted Java applet may lead to
arbitrary code execution with the privileges of the current user.
These issues are addressed by updating to Java version 1.6.0_33.
Further information is available via the Java website at http://www.o
racle.com/technetwork/java/javase/releasenotes-136954.html
CVE-ID
CVE-2012-0551
CVE-2012-1711
CVE-2012-1713
CVE-2012-1716
CVE-2012-1718
CVE-2012-1719
CVE-2012-1721
CVE-2012-1722
CVE-2012-1723
CVE-2012-1724
CVE-2012-1725

Java
Available for:  Mac OS X v10.6.8, Mac OS X Server v10.6.8
Impact:  The Java browser plugin and Java Web Start are deactivated
if they remain unused for 35 days
Description:  As a security hardening measure, the Java browser
plugin and Java Web Start are deactivated if they are unused for 35
days. Installing this update will automatically deactivate the Java
browser plugin and Java Web Start. Users may re-enable Java if they
encounter Java applets on a web page or Java Web Start applications
by clicking the region labeled "Inactive plug-in" on a web page. This
security measure is also available for OS Lion systems if the prior
update "Java for OS X 2012-003" was not installed.

Java
Available for:  Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7.4, OS X Lion Server v10.7.4
Impact:  The Java browser plugin and Java Web Start are deactivated
if they do not meet the criteria for minimum safe version
Description:  As a security hardening measure, the Java browser
plugin and Java Web Start are deactivated if they do not meet the
criteria for minimum safe version. The minimum safe version of Java
is updated daily, as needed. Users with out of date Java
installations may re-enable Java by updating the installed version of
Java using Software Update.

Note: These updates include the security content from Java for
OS X 2012-003 and Java for Mac OS X 10.6 Update 8.


Java for OS X 2012-004 and Java for Mac OS X 10.6 Update 9
may be obtained from the Software Update pane in System Preferences,
or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

For Mac OS X v10.6 systems
The download file is named: JavaForMacOSX10.6.dmg
Its SHA-1 digest is: c2fcc844b7073d8243588f3407eb3ce1d497043d

For OS X Lion systems
The download file is named: JavaForOSX.dmg
Its SHA-1 digest is: f176546327bc62d8cd397d54d1dc22b72aee1d2b

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=J235
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=tRoc
-----END PGP SIGNATURE-----