Operating System:

[OSX]

Published:

04 February 2013

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0144
                     Java for Mac OS X v10.6 Update 12
                              4 February 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          Java
Publisher:        Apple
Operating System: OS X
Impact/Access:    Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                  Modify Arbitrary Files          -- Remote/Unauthenticated
                  Delete Arbitrary Files          -- Remote/Unauthenticated
                  Denial of Service               -- Remote/Unauthenticated
                  Access Confidential Data        -- Remote/Unauthenticated
Resolution:       Patch/Upgrade
CVE Names:        CVE-2013-1481 CVE-2013-1480 CVE-2013-1478
                  CVE-2013-1476 CVE-2013-1475 CVE-2013-1473
                  CVE-2013-0450 CVE-2013-0446 CVE-2013-0445
                  CVE-2013-0443 CVE-2013-0442 CVE-2013-0441
                  CVE-2013-0440 CVE-2013-0438 CVE-2013-0435
                  CVE-2013-0434 CVE-2013-0433 CVE-2013-0432
                  CVE-2013-0429 CVE-2013-0428 CVE-2013-0427
                  CVE-2013-0426 CVE-2013-0425 CVE-2013-0424
                  CVE-2013-0423 CVE-2013-0419 CVE-2013-0409
                  CVE-2013-0351 CVE-2012-3342 CVE-2012-3213

Reference:        ASB-2013.0013

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2013-02-01-1 Java for Mac OS X v10.6 Update 12

Java for Mac OS X v10.6 Update 12 is now available and addresses the
following:

Java
Available for:  Mac OS X v10.6.8, Mac OS X Server v10.6.8
Impact:  Multiple vulnerabilities in Java 1.6.0_37
Description:  Multiple vulnerabilities exist in Java 1.6.0_37, the
most serious of which may allow an untrusted Java applet to execute
arbitrary code outside the Java sandbox. Visiting a web page
containing a maliciously crafted untrusted Java applet may lead to
arbitrary code execution with the privileges of the current user.
These issues are addressed by updating to Java version 1.6.0_39.
Further information is available via the Java website at http://www.o
racle.com/technetwork/java/javase/releasenotes-136954.html
CVE-ID
CVE-2012-3213
CVE-2012-3342
CVE-2013-0351
CVE-2013-0409
CVE-2013-0419
CVE-2013-0423
CVE-2013-0424
CVE-2013-0425
CVE-2013-0426
CVE-2013-0427
CVE-2013-0428
CVE-2013-0429
CVE-2013-0432
CVE-2013-0433
CVE-2013-0434
CVE-2013-0435
CVE-2013-0438
CVE-2013-0440
CVE-2013-0441
CVE-2013-0442
CVE-2013-0443
CVE-2013-0445
CVE-2013-0446
CVE-2013-0450
CVE-2013-1473
CVE-2013-1475
CVE-2013-1476
CVE-2013-1478
CVE-2013-1480
CVE-2013-1481


Java for Mac OS X 10.6 Update 12 may be obtained
from the Software Update pane in System Preferences or
Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

The download file is named: JavaForMacOSX10.6.dmg
Its SHA-1 digest is: 0c790491ca22ee009086ee1ec1f1b358024dd83e

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=qzRL
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9FFj
-----END PGP SIGNATURE-----