__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN Apple Security Update 2007-008 [307041] November 15, 2007 19:00 GMT Number S-056 ______________________________________________________________________________ PROBLEM: Several security vulnerabilities have been found in various products used with Mac Operating Systems. PLATFORM: Mac OS X v10.3.9, v10.4 through v10.4.10 Mac OS X Server v10.3.9, v10.4 through v10.4.10 DAMAGE: The execution of arbitrary code with system privileges. SOLUTION: Upgrade to the appropriate version. ______________________________________________________________________________ VULNERABILITY The risk is MEDIUM. A local user may be able to execute ASSESSMENT: arbitrary code with system privileges. ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/s-056.shtml ORIGINAL BULLETIN: http://docs.info.apple.com/article.html?artnum=307041 CVE: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2007-3456 CVE-2007-4678 CVE-2007-2926 CVE-2007-0953 CVE-2007-1260 CVE-2007-4679 CVE-2007-4680 CVE-2007-0464 CVE-2007-4681 CVE-2007-4682 CVE-2007-3999 CVE-2007-4743 CVE-2007-3749 CVE-2007-4683 CVE-2007-4684 CVE-2007-4685 CVE-2007-6127 CVE-2007-4686 CVE-2007-4687 CVE-2007-4688 CVE-2007-4269 CVE-2007-4689 CVE-2007-4267 CVE-2007-4268 CVE-2007-4690 CVE-2007-4691 CVE-2007-0646 CVE-2007-4692 CVE-2007-4693 CVE-2007-4694 CVE-2007-4695 CVE-2007-4696 CVE-2007-4697 CVE-2007-4698 CVE-2007-3758 CVE-2007-3760 CVE-2007-4671 CVE-2007-3756 CVE-2007-4699 CVE-2007-4700 CVE-2007-4701 ______________________________________________________________________________ [***** Start 307041 *****] Please visit Apple's Web site to view their Security Update 2007-008: http://docs.info.apple.com/article.html?artnum=307041 [***** End 307041 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Apple for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) S-046: TeTeX Security Update S-047: Guidance EnCase Vulnerability S-048: phpMyAdmin Vulnerability S-049: Mozilla Firefox Vulnerability S-050: Horde3 Vulnerabilities S-051: Perl-Compatible Regular Expression (PCRE) Security Update S-052: Ruby Security Update S-053: Vulnerability in Windows URI Handling S-054: Vulnerability in DNS S-055: HP OpenView Operations (OVO) Running on HP-UX and Solaris Vulnerability