toggle

AAPL Stock: 116.47 ( + 0.16 )

Printed from http://www.macnn.com

Security Update fixes Finder, iChat, more

updated 05:50 pm EST, Thu February 15, 2007

Apple Security Update

Apple today released Security Update 2007-002 to fix several vulnerabilities affecting the Mac OS X Finder, iChat, and the UserNotificationCenter process. One vulnerability could cause an application to crash or result in arbitrary code execution, resuming the user is enticed into opening a specially-crafted disk image resulting in a buffer overflow in Finder's handling of volume names. Two iChat-related security concerns are fixed in the update, preventing attackers on the local network from causing iChat to crash and foiling potential attempts by malicious websites to cause applications to crash or execute arbitrary code. The UserNotificationCenter process runs with elevated privileges in the context of local users, potentially allowing a malicious local user to overwrite or modify system files prior to the update. The update is available for download from Apple's website, as well as via the "Software Update" feature in Mac OS X located under the Apple menu.

Finder

A buffer overflow exists in Finder's handling of volume names. By enticing a user to mount a malicious disk
image, an attacker could trigger the issue, potentially leading to an application crash or arbitrary code execution. A proof of concept for this issue has been published on the Month of Apple Bugs (MoAB) website, and the update addresses the issue by performing additional validation of disk images. The issue does not affect systems prior to Mac OS X 10.4. Apple offers credit to Kevin Finisterre of DigitalMunition for reporting the issue.

iChat

A null pointer dereference in iChat's Bonjour message handling could allow a local network attacker to cause
an application crash. A proof of concept for the issue in Mac OS X 10.4 has been published on the Month of Apple Bugs (MoAB) website, and the update addresses the issues by performing additional validation of Bonjour messages.

A format string vulnerability also exists in the iChat AIM URL handler. By enticing a user to access a maliciously-crafted AIM URL, an attacker can trigger the overflow which could lead to an application crash or arbitrary code execution. A proof of concept for the issue has been published on the Month of Apple Bugs (MoAB) website, and the update addresses the issue by performing additional validation of AIM URLs.

UserNotification

The UserNotificationCenter process runs with elevated privileges in the context of a local user which could
allow a malicious local user to overwrite or modify system files. A program that triggers this issue has been published on the Month of Apple Bugs (MoAB) website, and the update addresses the issue by having UserNotificationCenter drop its group privileges immediately after launching.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

  1. jpellino

    Joined: Dec 1969

    0

    so much for moab's claims

    they made all that noise because apple would never respond to security concerns, and they did these all in record time. which is roughlyhow fast they do all their updates.

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

toggle

Most Popular

MacNN Sponsor

Recent Reviews

Plantronics BackBeat Pro Bluetooth headphones

Looking for a pair of headphones that can do everything a user requires is a task that can take some study. Trying to decide on in-ear ...

MaxUpgrades 512GB Retina MacBook Pro SSD

Apple's Retina line of MacBook Pro notebooks have been impressive, right from their debut in 2012. Thinner than the previous model, t ...

Lemur BlueDriver

"Oh no, the check engine light is on…again! What one of the hundreds of reasons could it be this time? Probably going to cost a for ...

toggle

Most Commented