toggle

AAPL Stock: 95.6 ( -2.55 )

Printed from http://www.macnn.com

Security Update fixes Finder, iChat, more

updated 05:50 pm EST, Thu February 15, 2007

Apple Security Update

Apple today released Security Update 2007-002 to fix several vulnerabilities affecting the Mac OS X Finder, iChat, and the UserNotificationCenter process. One vulnerability could cause an application to crash or result in arbitrary code execution, resuming the user is enticed into opening a specially-crafted disk image resulting in a buffer overflow in Finder's handling of volume names. Two iChat-related security concerns are fixed in the update, preventing attackers on the local network from causing iChat to crash and foiling potential attempts by malicious websites to cause applications to crash or execute arbitrary code. The UserNotificationCenter process runs with elevated privileges in the context of local users, potentially allowing a malicious local user to overwrite or modify system files prior to the update. The update is available for download from Apple's website, as well as via the "Software Update" feature in Mac OS X located under the Apple menu.

Finder

A buffer overflow exists in Finder's handling of volume names. By enticing a user to mount a malicious disk
image, an attacker could trigger the issue, potentially leading to an application crash or arbitrary code execution. A proof of concept for this issue has been published on the Month of Apple Bugs (MoAB) website, and the update addresses the issue by performing additional validation of disk images. The issue does not affect systems prior to Mac OS X 10.4. Apple offers credit to Kevin Finisterre of DigitalMunition for reporting the issue.

iChat

A null pointer dereference in iChat's Bonjour message handling could allow a local network attacker to cause
an application crash. A proof of concept for the issue in Mac OS X 10.4 has been published on the Month of Apple Bugs (MoAB) website, and the update addresses the issues by performing additional validation of Bonjour messages.

A format string vulnerability also exists in the iChat AIM URL handler. By enticing a user to access a maliciously-crafted AIM URL, an attacker can trigger the overflow which could lead to an application crash or arbitrary code execution. A proof of concept for the issue has been published on the Month of Apple Bugs (MoAB) website, and the update addresses the issue by performing additional validation of AIM URLs.

UserNotification

The UserNotificationCenter process runs with elevated privileges in the context of a local user which could
allow a malicious local user to overwrite or modify system files. A program that triggers this issue has been published on the Month of Apple Bugs (MoAB) website, and the update addresses the issue by having UserNotificationCenter drop its group privileges immediately after launching.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

  1. jpellino

    Joined: Dec 1969

    0

    so much for moab's claims

    they made all that noise because apple would never respond to security concerns, and they did these all in record time. which is roughlyhow fast they do all their updates.

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

toggle

Most Popular

MacNN Sponsor

Recent Reviews

SMS Audio Sync Sport on-ear headphones

When hitting the gym or going out for a trail run, headphones can cause a number of problems. From the ear buds getting slimy with swe ...

Adesso Xtream S3B Bluetooth speaker

Finding a speaker purpose-built for a specific need is challenging. Even when a Bluetooth speaker can be paired with a mobile device, ...

JBL Synchros E40BT headphones

For all the different configurations of headphones on the market, it's always a tough choice for buyers to get something that is just ...

toggle

Most Commented