Apple released Mac OS 10.6.7 Wednesday (read our full coverage for more information), and the security patch notes for the update show that it includes fixes for 55 security issues. They fixes cover AirPort, Apache, AppleScript, Terminal, QuickTime, X11, several Core services, and more. Several of them are serious issues that could allow the bad guys to gain control of your Mac.
The security patch notes for the update:
Mac OS X v10.6.7 and Security Update 2011-001
AirPort
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset
Description: A divide by zero issue existed in the handling of Wi-Fi frames. When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2011-0172
Apache
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in Apache 2.2.15
Description: Apache is updated to version 2.2.17 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/
CVE-ID
CVE-2010-1452
CVE-2010-2068
AppleScript
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution
Description: A format string issue existed in AppleScript Studio’s generic dialog commands (“display dialog” and “display alert”). Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0173 : Alexander Strange
ATS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: A heap buffer overflow issue existed in the handling of OpenType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0174
ATS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: Multiple buffer overflow issues existed in the handling of TrueType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0175 : Christoph Diehl of Mozilla, Felix Grobert of the Google Security Team, Marc Schoenefeld of Red Hat Security Response Team, Tavis Ormandy and Will Drewry of Google Security Team
ATS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: Multiple buffer overflow issues existed in the handling of Type 1 fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0176 : Felix Grobert of the Google Security Team, geekable working with TippingPoint’s Zero Day Initiative
ATS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: Multiple buffer overflow issues existed in the handling of SFNT tables. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0177 : Marc Schoenefeld of Red Hat Security Response Team
bzip2
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution
Description: An integer overflow issue existed in bzip2’s handling of bzip2 compressed files. Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2010-0405
CarbonCore
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Applications that use FSFindFolder() with the kTemporaryFolderType flag may be vulnerable to a local information disclosure
Description: When used with the kTemporaryFolderType flag, the FSFindFolder() API returns a directory that is world readable. This issue is addressed by returning a directory that is only readable by the user that the process is running as.
CVE-ID
CVE-2011-0178
ClamAV
Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6.6
Impact: Multiple vulnerabilities in ClamAV
Description: Multiple vulnerabilities exist in ClamAV, the most serious of which may lead to arbitrary code execution. This update addresses the issues by updating ClamAV to version 0.96.5. ClamAV is distributed only with Mac OS X Server systems. Further information is available via the ClamAV website at http://www.clamav.net/
CVE-ID
CVE-2010-0405
CVE-2010-3434
CVE-2010-4260
CVE-2010-4261
CVE-2010-4479
CoreText
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: A memory corruption issue existed in CoreText’s handling of font files. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0179 : Christoph Diehl of Mozilla
File Quarantine
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Definition added
Description: The OSX.OpinionSpy definition has been added to the malware check within File Quarantine.
HFS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: A local user may be able to read arbitrary files from an HFS, HFS+, or HFS+J filesystem
Description: An integer overflow issue existed in the handling of the F_READBOOTSTRAP ioctl. A local user may be able to read arbitrary files from an HFS, HFS+, or HFS+J filesystem.
CVE-ID
CVE-2011-0180 : Dan Rosenberg of Virtual Security Research
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A heap buffer overflow issue existed in ImageIO’s handling of JPEG images. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0170 : Andrzej Dyjak working with iDefense VCP
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted XBM image may result in an unexpected application termination or arbitrary code execution
Description: An integer overflow issue existed in ImageIO’s handling of XBM images. Viewing a maliciously crafted XBM image may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0181 : Harry Sintonen
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in libTIFF’s handling of JPEG encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0191 : Apple
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in libTIFF’s handling of CCITT Group 4 encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0192 : Apple
ImageIO
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted JPEG-encoded TIFF image may result in an unexpected application termination or arbitrary code execution
Description: An integer overflow issue existed in ImageIO’s handling of JPEG-encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2011-0194 : Dominic Chell of NGS Secure
Image RAW
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution
Description: Multiple buffer overflow issues existed in Image RAW’s handling of Canon RAW images. Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0193 : Paul Harrington of NGS Secure
Installer
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to the installation of an agent that contacts an arbitrary server when the user logs in, and mislead the user into thinking that the connection is with Apple
Description: A URL processing issue in Install Helper may lead to the installation of an agent that contacts an arbitrary server when the user logs in. The dialog resulting from a connection failure may lead the user to believe that the connection was attempted with Apple. This issue is addressed by removing Install Helper.
CVE-ID
CVE-2011-0190 : Aaron Sigel of vtty.com
Kerberos
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in MIT Kerberos 5
Description: Multiple cryptographic issues existed in MIT Kerberos 5. Only CVE-2010-1323 affects Mac OS X v10.5. Further information on the issues and the patches applied is available via the MIT Kerberos website at http://web.mit.edu/Kerberos/
CVE-ID
CVE-2010-1323
CVE-2010-1324
CVE-2010-4020
CVE-2010-4021
Kernel
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: A local user may be able to execute arbitrary code with system privileges
Description: A privilege checking issue existed in the i386_set_ldt system call’s handling of call gates. A local user may be able to execute arbitrary code with system privileges. This issue is addressed by disallowing creation of call gate entries via i386_set_ldt().
CVE-ID
CVE-2011-0182 : Jeff Mears
Libinfo
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: A remote attacker may be able to cause a denial of service on hosts that export NFS file systems
Description: An integer truncation issue existed in Libinfo’s handling of NFS RPC packets. A remote attacker may be able to cause NFS RPC services such as lockd, statd, mountd, and portmap to become unresponsive.
CVE-ID
CVE-2011-0183 : Peter Schwenk of the University of Delaware
libxml
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in libxml’s XPath handling. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2010-4008 : Bui Quang Minh from Bkis (www.bkis.com)
libxml
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A double free issue existed in libxml’s handling of XPath expressions. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2010-4494 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences
Mailman
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in Mailman 2.1.13
Description: Multiple cross-site scripting issues existed in Mailman 2.1.13. These issues are addressed by updating Mailman to version 2.1.14. Further information is available via the Mailman site at http://mail.python.org/pipermail/mailman-announce/2010-September/000154.html
CVE-ID
CVE-2010-3089
PHP
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in PHP 5.3.3
Description: PHP is updated to version 5.3.4 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP website at http://www.php.net/
CVE-ID
CVE-2006-7243
CVE-2010-2950
CVE-2010-3709
CVE-2010-3710
CVE-2010-3870
CVE-2010-4150
CVE-2010-4409
PHP
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Multiple vulnerabilities in PHP 5.2.14
Description: PHP is updated to version 5.2.15 to address multiple vulnerabilities, the most serious of which may lead to arbitary code execution. Further information is available via the PHP website at http://www.php.net/
CVE-ID
CVE-2010-3436
CVE-2010-3709
CVE-2010-4150
QuickLook
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Downloading a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickLook’s handling of Excel files. Downloading a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2011-0184 : Tobias Klein working with Verisign iDefense Labs
QuickLook
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickLook’s handling of Microsoft Office files. Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-1417 : Charlie Miller and Dion Blazakis, working with TippingPoint’s Zero Day Initiative
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted JPEG2000 image with QuickTime may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in QuickTime’s handling of JPEG2000 images. Viewing a maliciously crafted JPEG2000 image with QuickTime may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0186 : Will Dormann of the CERT/CC
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: An integer overflow existed in QuickTime’s handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.
CVE-ID
CVE-2010-4009 : Honggang Ren of Fortinet’s FortiGuard Labs
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickTime’s handling of FlashPix images. Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.
CVE-ID
CVE-2010-3801 : Damian Put working with TippingPoint’s Zero Day Initiative, and Rodrigo Rubira Branco from the Check Point Vulnerability Discovery Team
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to the disclosure of video data from another site
Description: A cross-origin issue existed in QuickTime plug-in’s handling of cross-site redirects. Visiting a maliciously crafted website may lead to the disclosure of video data from another site. This issue is addressed by preventing QuickTime from following cross-site redirects.
CVE-ID
CVE-2011-0187 : Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR)
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickTime’s handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files. Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.
CVE-ID
CVE-2010-3802 : an anonymous researcher working with TippingPoint’s Zero Day Initiative
Ruby
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Running a Ruby script that uses untrusted input to create a BigDecimal object may lead to an unexpected application termination or arbitrary code execution
Description: An integer truncation issue existed in Ruby’s BigDecimal class. Running a Ruby script that uses untrusted input to create a BigDecimal object may lead to an unexpected application termination or arbitrary code execution. This issue only affects 64-bit Ruby processes.
CVE-ID
CVE-2011-0188 : Apple
Samba
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution
Description: A stack buffer overflow existed in Samba’s handling of Windows Security IDs. If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution.
CVE-ID
CVE-2010-3069
Subversion
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Subversion servers that use the non-default “SVNPathAuthz short_circuit” mod_dav_svn configuration setting may allow unauthorized users to access portions of the repository
Description: Subversion servers that use the non-default “SVNPathAuthz short_circuit” mod_dav_svn configuration setting may allow unauthorized users to access portions of the repository. This issue is addressed by updating Subversion to version 1.6.13. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2010-3315
Terminal
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: When ssh is used in Terminal’s “New Remote Connection” dialog, SSH version 1 is selected as the default protocol version
Description: When ssh is used in Terminal’s “New Remote Connection” dialog, SSH version 1 is selected as the default protocol version. This issue is addressed by changing the default protocol version to “Automatic”. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2011-0189 : Matt Warren of HNW Inc.
X11
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in FreeType
Description: Multiple vulnerabilities existed in FreeType, the most serious of which may lead to arbitrary code execution when processing a maliciously crafted font. These issues are addressed by updating FreeType to version 2.4.3. Further information is available via the FreeType site at http://www.freetype.org/
CVE-ID
CVE-2010-3814
CVE-2010-3855