VARIoT IoT vulnerabilities database
    | VAR-200812-0531 | No CVE | COMTREND CT-536 Router Multiple Denial of Service and Information Disclosure Vulnerabilities | 
                                      
                                        CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM  | 
                            The Comtrend CT-536 is a small ADSL wireless broadband router. CT-536's micro_httpd service program does not properly validate user requests. Non-privileged users can access restricted resources by submitting malicious requests. During the authentication process, the credentials are sent in clear text, and any user can easily read the authentication credentials. CT-536 does not properly filter certain field autos and data, and remote attackers can exploit cross-site scripting and buffer overflow attacks to cause the httpd configuration server to denial of service. COMTREND CT-536 and HG-536 are prone to multiple remote vulnerabilities:
- Multiple unauthorized-access vulnerabilities
- An information-disclosure vulnerability
- Multiple cross-site scripting vulnerabilities
- A denial-of-service vulnerability
- Multiple buffer-overflow vulnerabilities
Attackers can exploit these issues to compromise the affected device, obtain sensitive information, execute arbitrary script code, steal cookie-based authentication credentials, and cause a denial-of-service condition. Other attacks are also possible. 
The following firmware versions are vulnerable; additional versions may also be affected:
CT-536 A101-302JAZ-C01_R05
HG-536+ A101-302JAZ-C01_R05 and A101-302JAZ-C03_R14.A2pB021g.d15h
                        
| VAR-200812-0328 | CVE-2008-1094 | Barracuda Spam Firewall of Account View In the page index.cgi In SQL Injection vulnerability | 
                                      
                                        CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM  | 
                            SQL injection vulnerability in index.cgi in the Account View page in Barracuda Spam Firewall (BSF) before 3.5.12.007 allows remote authenticated administrators to execute arbitrary SQL commands via a pattern_x parameter in a search_count_equals action, as demonstrated by the pattern_0 parameter. Multiple Barracuda products are prone to multiple input-validation vulnerabilities, including multiple cross-site scripting vulnerabilities, an HTML-injection vulnerability, and an SQL-injection vulnerability. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 
Versions prior to the following are affected:
Barracuda Message Archiver  to 1.2.1.002. 
Barracuda Spam Firewall 3.5.12.007 and prior
Barracuda Web Filter 3.3.0.052 and prior
Barracuda IM Firewall 3.1.01.017 and prior
Barracuda Load Balancer 2.3.024 and prior. Barracuda Spam Firewall is an integrated hardware and software spam solution for protecting mail servers. ----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
http://secunia.com/advisories/business_solutions/
----------------------------------------------------------------------
TITLE:
Barracuda Products Cross-Site Scripting Vulnerabilities
SECUNIA ADVISORY ID:
SA33164
VERIFY ADVISORY:
http://secunia.com/advisories/33164/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
OPERATING SYSTEM:
Barracuda Spam Firewall
http://secunia.com/advisories/product/4639/
Barracuda IM Firewall
http://secunia.com/advisories/product/20790/
Barracuda Load Balancer
http://secunia.com/advisories/product/20791/
Barracuda Message Archiver
http://secunia.com/advisories/product/20788/
Barracuda Web Filter
http://secunia.com/advisories/product/20789/
DESCRIPTION:
Dr. 
Input passed to various parameters is not properly sanitised before
being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site. 
SOLUTION:
Update to the latest version. Marian Ventuneac, Data Communications Security Laboratory,
University of Limerick
ORIGINAL ADVISORY:
Barracuda Networks:
http://www.barracudanetworks.com/ns/support/tech_alert.php
Dr. Marian Ventuneac:
http://dcsl.ul.ie/advisories/02.htm
http://dcsl.ul.ie/advisories/03.htm
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-200812-0243 | CVE-2008-0971 | plural Barracuda Product index.cgi Vulnerable to cross-site scripting | 
                                      
                                        CVSS V2: 3.5 CVSS V3: - Severity: LOW  | 
                            Multiple cross-site scripting (XSS) vulnerabilities in index.cgi in Barracuda Spam Firewall (BSF) before 3.5.12.007, Message Archiver before 1.2.1.002, Web Filter before 3.3.0.052, IM Firewall before 3.1.01.017, and Load Balancer before 2.3.024 allow remote attackers to inject arbitrary web script or HTML via (1) the Policy Name field in Search Based Retention Policy in Message Archiver; unspecified parameters in the (2) IP Configuration, (3) Administration, (4) Journal Accounts, (5) Retention Policy, and (6) GroupWise Sync components in Message Archiver; (7) input to search operations in Web Filter; and (8) input used in error messages and (9) hidden INPUT elements in (a) Spam Firewall, (b) IM Firewall, and (c) Web Filter. plural Barracuda Product index.cgi Contains a cross-site scripting vulnerability.By any third party through the following process Web Script or HTML May be inserted. Multiple Barracuda products are prone to multiple input-validation vulnerabilities, including multiple cross-site scripting vulnerabilities, an HTML-injection vulnerability, and an SQL-injection vulnerability. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 
Versions prior to the following are affected:
Barracuda Message Archiver  to 1.2.1.002. 
Barracuda Spam Firewall 3.5.12.007 and prior
Barracuda Web Filter 3.3.0.052 and prior
Barracuda IM Firewall 3.1.01.017 and prior
Barracuda Load Balancer 2.3.024 and prior. Barracuda Spam Firewall is an integrated hardware and software spam solution for protecting mail servers. ----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
http://secunia.com/advisories/business_solutions/
----------------------------------------------------------------------
TITLE:
Barracuda Products Cross-Site Scripting Vulnerabilities
SECUNIA ADVISORY ID:
SA33164
VERIFY ADVISORY:
http://secunia.com/advisories/33164/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
OPERATING SYSTEM:
Barracuda Spam Firewall
http://secunia.com/advisories/product/4639/
Barracuda IM Firewall
http://secunia.com/advisories/product/20790/
Barracuda Load Balancer
http://secunia.com/advisories/product/20791/
Barracuda Message Archiver
http://secunia.com/advisories/product/20788/
Barracuda Web Filter
http://secunia.com/advisories/product/20789/
DESCRIPTION:
Dr. 
Input passed to various parameters is not properly sanitised before
being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site. 
SOLUTION:
Update to the latest version. Marian Ventuneac, Data Communications Security Laboratory,
University of Limerick
ORIGINAL ADVISORY:
Barracuda Networks:
http://www.barracudanetworks.com/ns/support/tech_alert.php
Dr. Marian Ventuneac:
http://dcsl.ul.ie/advisories/02.htm
http://dcsl.ul.ie/advisories/03.htm
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-200901-0071 | CVE-2008-5882 | Citrix Application Gateway Broadcast Server (BCS) of login.asp In SQL Injection vulnerability | 
                                      
                                        CVSS V2: 7.5 CVSS V3: - Severity: HIGH  | 
                            SQL injection vulnerability in login.asp in Citrix Application Gateway - Broadcast Server (BCS) before 6.1, as used by Avaya AG250 - Broadcast Server before 2.0 and possibly other products, allows remote attackers to execute arbitrary SQL commands via the txtUID parameter. 
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code. Other versions may also be affected. 
PROVIDED AND/OR DISCOVERED BY:
The vendor credits the Vulnerability Research Team of Digital
Defense, Inc. 
ORIGINAL ADVISORY:
Citrix:
http://support.citrix.com/article/CTX119315
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-200812-0096 | CVE-2008-5662 | Sun Java Wireless Toolkit (WTK) Vulnerable to buffer overflow | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            Multiple buffer overflows in Sun Java Wireless Toolkit (WTK) for CLDC 2.5.2 and earlier allow downloaded programs to execute arbitrary code via unknown vectors. Sun Java Wireless Toolkit for CDLC  is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. 
An attacker can exploit this issue to execute arbitrary code in the context of the toolkit. Failed attacks will likely cause denial-of-service conditions. 
Sun Java Wireless Toolkit 2.5.2 and prior versions are vulnerable. ----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
http://secunia.com/advisories/business_solutions/
----------------------------------------------------------------------
TITLE:
Sun Java Wireless Toolkit for CLDC Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID:
SA33159
VERIFY ADVISORY:
http://secunia.com/advisories/33159/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From remote
SOFTWARE:
Sun Java Wireless Toolkit for CLDC 2.x
http://secunia.com/advisories/product/20784/
DESCRIPTION:
Some vulnerabilities have been reported in Sun Java Wireless Toolkit
for CLDC, which can be exploited by malicious people to bypass
certain security restrictions. 
http://java.sun.com/products/sjwtoolkit/
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor. 
ORIGINAL ADVISORY:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-247566-1
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-200812-0363 | CVE-2008-4219 | Apple Mac OS X of Kernel Service disruption in (DoS) Vulnerabilities | 
                                      
                                        CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM  | 
                            The kernel in Apple Mac OS X before 10.5.6 allows local users to cause a denial of service (infinite loop and system halt) by running an application that is dynamically linked to libraries on an NFS server, related to occurrence of an exception in this application. 
Attackers can leverage this issue to cause denial-of-service conditions. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. 
The security update addresses a total of 10 new vulnerabilities that affect the Apple Type Services, BOM, kernel, Libsystem, Managed Client, natd, and Podcast Producer components of Mac OS X. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. The following individual records have been created to better document the issues:
32870 Apple Podcast Producer Authentication-Bypass Vulnerability
32872 Apple Mac OS X UDF ISO File Handling Denial of Service Vulnerability
32873 Apple Mac OS X NFS Mounted Executable Exception Remote Denial of Service Vulnerability
32874 Apple Mac OS X 'natd' Remote Denial of Service Vulnerability
32875 Apple Mac OS X Type Services PDF File Remote Denial of Service Vulnerability
32876 Apple Mac OS X BOM CPIO Header Stack Buffer Overflow Vulnerability
32877 Apple Mac OS X 'inet_net_pton' API Integer Overflow Vulnerability
32879 Apple Mac OS X 'i386_set_ldt' and '1386_get_ldt' Multiple Integer Overflow Vulnerabilities
32880 Apple Mac OS X Managed Client Screen Saver Lock Bypass Vulnerability
32881 Apple Mac OS X 'strptime' API Memory Corruption Vulnerability. 
1) An infinite loop when processing certain embedded fonts in PDF
files within the Apple Type Services server can be exploited to cause
a DoS (Denial of Service) by e.g. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
Successful exploitation may allow the execution of arbitrary code. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. 
8) An unspecified error when processing certain input within the
"strptime()" API of Libsystem can be exploited to cause a memory
corruption and potentially execute arbitrary code by e.g. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0364 | CVE-2008-4220 | Apple Mac OS X inet_net_pton API Integer overflow vulnerability | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Integer overflow in the inet_net_pton API in Libsystem in Apple Mac OS X before 10.5.6 allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.  NOTE: this may be related to the WLB-2008080064 advisory published by SecurityReason on 20080822; however, as of 20081216, there are insufficient details to be sure. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. 
The security update addresses a total of 10 new vulnerabilities that affect the Apple Type Services, BOM, kernel, Libsystem, Managed Client, natd, and Podcast Producer components of Mac OS X. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. 
1) An infinite loop when processing certain embedded fonts in PDF
files within the Apple Type Services server can be exploited to cause
a DoS (Denial of Service) by e.g. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
Successful exploitation may allow the execution of arbitrary code. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
6) An infinite loop when handling exceptions in an application linked
to libraries on an NFS share can be exploited to cause a system
shutdown. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0360 | CVE-2008-4234 | Apple Mac OS X of CoreTypes Vulnerable to arbitrary code execution | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            Incomplete blacklist vulnerability in the Quarantine feature in CoreTypes in Apple Mac OS X 10.5 before 10.5.6 allows user-assisted remote attackers to execute arbitrary code via an executable file with the content type indicating no application association for the file, which does not trigger a "potentially unsafe" warning message. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. 
The security update addresses a total of 10 new vulnerabilities that affect the Apple Type Services, BOM, kernel, Libsystem, Managed Client, natd, and Podcast Producer components of Mac OS X. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. The following individual records have been created to better document the issues:
32870 Apple Podcast Producer Authentication-Bypass Vulnerability
32872 Apple Mac OS X UDF ISO File Handling Denial of Service Vulnerability
32873 Apple Mac OS X NFS Mounted Executable Exception Remote Denial of Service Vulnerability
32874 Apple Mac OS X 'natd' Remote Denial of Service Vulnerability
32875 Apple Mac OS X Type Services PDF File Remote Denial of Service Vulnerability
32876 Apple Mac OS X BOM CPIO Header Stack Buffer Overflow Vulnerability
32877 Apple Mac OS X 'inet_net_pton' API Integer Overflow Vulnerability
32879 Apple Mac OS X 'i386_set_ldt' and '1386_get_ldt' Multiple Integer Overflow Vulnerabilities
32880 Apple Mac OS X Managed Client Screen Saver Lock Bypass Vulnerability
32881 Apple Mac OS X 'strptime' API Memory Corruption Vulnerability. 
Successfully exploiting this issue may allow an attacker to execute  arbitrary code in the context of the affected application. Failed exploit attempts may cause a denial-of-service condition. 
-. Apps such as Safari use the download verification feature to warn users before launching unsafe files. 
1) An infinite loop when processing certain embedded fonts in PDF
files within the Apple Type Services server can be exploited to cause
a DoS (Denial of Service) by e.g. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
6) An infinite loop when handling exceptions in an application linked
to libraries on an NFS share can be exploited to cause a system
shutdown. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. 
8) An unspecified error when processing certain input within the
"strptime()" API of Libsystem can be exploited to cause a memory
corruption and potentially execute arbitrary code by e.g. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0362 | CVE-2008-4218 | Apple Mac OS X of Kernel Integer overflow vulnerability | 
                                      
                                        CVSS V2: 7.2 CVSS V3: - Severity: HIGH  | 
                            Multiple integer overflows in the kernel in Apple Mac OS X before 10.5.6 on Intel platforms allow local users to gain privileges via a crafted call to (1) i386_set_ldt or (2) i386_get_ldt. 
Local attackers can exploit these issues to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting these issues will completely compromise an affected computer. Failed exploit attempts will likely crash the affected computer. 
Apple Mac OS X 10.5 through 10.5.5 and Mac OS X Server 10.5 through 10.5.5 are vulnerable. 
NOTE: This issue was previously covered in BID 32839 (Apple Mac OS X 2008-008 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. 
1) An infinite loop when processing certain embedded fonts in PDF
files within the Apple Type Services server can be exploited to cause
a DoS (Denial of Service) by e.g. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
Successful exploitation may allow the execution of arbitrary code. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
Note: This does not affect PowerPC systems. 
6) An infinite loop when handling exceptions in an application linked
to libraries on an NFS share can be exploited to cause a system
shutdown. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. 
8) An unspecified error when processing certain input within the
"strptime()" API of Libsystem can be exploited to cause a memory
corruption and potentially execute arbitrary code by e.g. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0358 | CVE-2008-4223 | Apple Mac OS X of Podcast Producer Elevation of privilege vulnerability | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Podcast Producer in Apple Mac OS X 10.5 before 10.5.6 allows remote attackers to bypass authentication and gain administrative access via unspecified vectors. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. The following individual records have been created to better document the issues:
32870 Apple Podcast Producer Authentication-Bypass Vulnerability
32872 Apple Mac OS X UDF ISO File Handling Denial of Service Vulnerability
32873 Apple Mac OS X NFS Mounted Executable Exception Remote Denial of Service Vulnerability
32874 Apple Mac OS X 'natd' Remote Denial of Service Vulnerability
32875 Apple Mac OS X Type Services PDF File Remote Denial of Service Vulnerability
32876 Apple Mac OS X BOM CPIO Header Stack Buffer Overflow Vulnerability
32877 Apple Mac OS X 'inet_net_pton' API Integer Overflow Vulnerability
32879 Apple Mac OS X 'i386_set_ldt' and '1386_get_ldt' Multiple Integer Overflow Vulnerabilities
32880 Apple Mac OS X Managed Client Screen Saver Lock Bypass Vulnerability
32881 Apple Mac OS X 'strptime' API Memory Corruption Vulnerability. Podcast Producer is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to gain access to certain administrative functions. This may result in an elevation of privilege and may aid in further attacks. 
This issue affects Podcast Producer for Mac OS X Server 10.5 through 10.5.5. 
1) An infinite loop when processing certain embedded fonts in PDF
files within the Apple Type Services server can be exploited to cause
a DoS (Denial of Service) by e.g. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
Successful exploitation may allow the execution of arbitrary code. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
6) An infinite loop when handling exceptions in an application linked
to libraries on an NFS share can be exploited to cause a system
shutdown. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. 
8) An unspecified error when processing certain input within the
"strptime()" API of Libsystem can be exploited to cause a memory
corruption and potentially execute arbitrary code by e.g. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0361 | CVE-2008-4217 | Apple Mac OS X of BOM Vulnerabilities in arbitrary code execution | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            Integer signedness error in BOM in Apple Mac OS X before 10.5.6 allows remote attackers to execute arbitrary code via the headers in a crafted CPIO archive, leading to a stack-based buffer overflow. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. 
The security update addresses a total of 10 new vulnerabilities that affect the Apple Type Services, BOM, kernel, Libsystem, Managed Client, natd, and Podcast Producer components of Mac OS X. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. 
Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. 
1) An infinite loop when processing certain embedded fonts in PDF
files within the Apple Type Services server can be exploited to cause
a DoS (Denial of Service) by e.g. tricking a user into opening a
malicious PDF file. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
6) An infinite loop when handling exceptions in an application linked
to libraries on an NFS share can be exploited to cause a system
shutdown. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. 
8) An unspecified error when processing certain input within the
"strptime()" API of Libsystem can be exploited to cause a memory
corruption and potentially execute arbitrary code by e.g. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0357 | CVE-2008-4222 | Apple Mac OS X of network_cmds Service disruption in (DoS) Vulnerabilities | 
                                      
                                        CVSS V2: 7.1 CVSS V3: - Severity: HIGH  | 
                            natd in network_cmds in Apple Mac OS X before 10.5.6, when Internet Sharing is enabled, allows remote attackers to cause a denial of service (infinite loop) via a crafted TCP packet. 
This issue affects Mac OS X 10.4.11, 10.5 through 10.5.5, Server 10.4.11, and Server 10.5 through 10.5.5. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. 
The security update addresses a total of 10 new vulnerabilities that affect the Apple Type Services, BOM, kernel, Libsystem, Managed Client, natd, and Podcast Producer components of Mac OS X. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
Successful exploitation may allow the execution of arbitrary code. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
6) An infinite loop when handling exceptions in an application linked
to libraries on an NFS share can be exploited to cause a system
shutdown. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. 
8) An unspecified error when processing certain input within the
"strptime()" API of Libsystem can be exploited to cause a memory
corruption and potentially execute arbitrary code by e.g. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0359 | CVE-2008-4224 | Apple Mac OS X of UDF Service disruption in (DoS) Vulnerabilities | 
                                      
                                        CVSS V2: 7.1 CVSS V3: - Severity: HIGH  | 
                            UDF in Apple Mac OS X before 10.5.6 allows user-assisted attackers to cause a denial of service (system crash) via a malformed UDF volume in a crafted ISO file. 
Attackers can exploit this issue to cause the computer to shut down, denying service to legitimate users. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. 
The security update addresses a total of 10 new vulnerabilities that affect the Apple Type Services, BOM, kernel, Libsystem, Managed Client, natd, and Podcast Producer components of Mac OS X. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. Dealing with deformities UDF There was an input validation error when labeling, a malicious ISO file may cause the system to shut down unexpectedly. 
1) An infinite loop when processing certain embedded fonts in PDF
files within the Apple Type Services server can be exploited to cause
a DoS (Denial of Service) by e.g. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
Successful exploitation may allow the execution of arbitrary code. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
6) An infinite loop when handling exceptions in an application linked
to libraries on an NFS share can be exploited to cause a system
shutdown. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. 
8) An unspecified error when processing certain input within the
"strptime()" API of Libsystem can be exploited to cause a memory
corruption and potentially execute arbitrary code by e.g. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0356 | CVE-2008-4221 | Apple Mac OS X strptime API Vulnerable to arbitrary code execution | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            The strptime API in Libsystem in Apple Mac OS X before 10.5.6 allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a crafted date string, related to improper memory allocation. 
Successfully exploiting this issue allows remote attackers to trigger denial-of-service conditions or to execute arbitrary code in the context of applications that use the API. 
This issue affects Mac OS X 10.4.11, 10.5 through 10.5.5, Server 10.4.11, and Server 10.5 through 10.5.5. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. 
The security update addresses a total of 10 new vulnerabilities that affect the Apple Type Services, BOM, kernel, Libsystem, Managed Client, natd, and Podcast Producer components of Mac OS X. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. The following individual records have been created to better document the issues:
32870 Apple Podcast Producer Authentication-Bypass Vulnerability
32872 Apple Mac OS X UDF ISO File Handling Denial of Service Vulnerability
32873 Apple Mac OS X NFS Mounted Executable Exception Remote Denial of Service Vulnerability
32874 Apple Mac OS X 'natd' Remote Denial of Service Vulnerability
32875 Apple Mac OS X Type Services PDF File Remote Denial of Service Vulnerability
32876 Apple Mac OS X BOM CPIO Header Stack Buffer Overflow Vulnerability
32877 Apple Mac OS X 'inet_net_pton' API Integer Overflow Vulnerability
32879 Apple Mac OS X 'i386_set_ldt' and '1386_get_ldt' Multiple Integer Overflow Vulnerabilities
32880 Apple Mac OS X Managed Client Screen Saver Lock Bypass Vulnerability
32881 Apple Mac OS X 'strptime' API Memory Corruption Vulnerability. 
1) An infinite loop when processing certain embedded fonts in PDF
files within the Apple Type Services server can be exploited to cause
a DoS (Denial of Service) by e.g. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
Successful exploitation may allow the execution of arbitrary code. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
6) An infinite loop when handling exceptions in an application linked
to libraries on an NFS share can be exploited to cause a system
shutdown. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0342 | CVE-2008-4237 | Apple Mac OS of Managed Client Vulnerabilities with unexpected settings | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Managed Client in Apple Mac OS X before 10.5.6 sometimes misidentifies a system when installing per-host configuration settings, which allows context-dependent attackers to have an unspecified impact by leveraging unintended settings, as demonstrated by the screen saver lock setting. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. 
The security update addresses a total of 10 new vulnerabilities that affect the Apple Type Services, BOM, kernel, Libsystem, Managed Client, natd, and Podcast Producer components of Mac OS X. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. The following individual records have been created to better document the issues:
32870 Apple Podcast Producer Authentication-Bypass Vulnerability
32872 Apple Mac OS X UDF ISO File Handling Denial of Service Vulnerability
32873 Apple Mac OS X NFS Mounted Executable Exception Remote Denial of Service Vulnerability
32874 Apple Mac OS X 'natd' Remote Denial of Service Vulnerability
32875 Apple Mac OS X Type Services PDF File Remote Denial of Service Vulnerability
32876 Apple Mac OS X BOM CPIO Header Stack Buffer Overflow Vulnerability
32877 Apple Mac OS X 'inet_net_pton' API Integer Overflow Vulnerability
32879 Apple Mac OS X 'i386_set_ldt' and '1386_get_ldt' Multiple Integer Overflow Vulnerabilities
32880 Apple Mac OS X Managed Client Screen Saver Lock Bypass Vulnerability
32881 Apple Mac OS X 'strptime' API Memory Corruption Vulnerability. 
An attacker with physical access to affected computers may take advantage of this issue to bypass expected security measures. This may allow the attacker to obtain sensitive information or may aid in further attacks. 
This issue affects Mac OS X 10.5 through 10.5.5 and Server 10.5 through 10.5.5. On misidentified systems, the per-host settings were not applied. 
1) An infinite loop when processing certain embedded fonts in PDF
files within the Apple Type Services server can be exploited to cause
a DoS (Denial of Service) by e.g. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
Successful exploitation may allow the execution of arbitrary code. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
6) An infinite loop when handling exceptions in an application linked
to libraries on an NFS share can be exploited to cause a system
shutdown. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. 
8) An unspecified error when processing certain input within the
"strptime()" API of Libsystem can be exploited to cause a memory
corruption and potentially execute arbitrary code by e.g. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0341 | CVE-2008-4236 | Apple Mac OS X of Apple Type Services (ATS) Service disruption in (DoS) Vulnerabilities | 
                                      
                                        CVSS V2: 7.1 CVSS V3: - Severity: HIGH  | 
                            Apple Type Services (ATS) in Apple Mac OS X 10.5 before 10.5.6 allows remote attackers to cause a denial of service (infinite loop) via a crafted embedded font in a PDF file. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-008. The advisory also contains security updates for 10 previously reported issues. 
This BID is being retired. 
Successful exploits will allow attackers to cause the application to fall into an infinite loop, denying service to legitimate users. Viewing or downloading PDF files containing specially-designed fonts may result in denial of service. tricking a user into opening a
malicious PDF file. 
2) A signedness error when handling certain CPIO archive headers
exists within BOM. This can be exploited to execute arbitrary code by
e.g. downloading or viewing a specially crafted CPIO archive. 
3) An error within the processing of color spaces within CoreGraphics
can be exploited to cause a heap-based buffer overflow by e.g. 
tricking a user into viewing a specially crafted image. 
Successful exploitation may allow the execution of arbitrary code. 
4) Some security issues and vulnerabilities have been reported in
Adobe Flash Player, which can be exploited by malicious people to
bypass certain security restrictions, manipulate certain data,
conduct cross-site scripting attacks, or disclose sensitive
information. 
For more information:
SA32270
5) Multiple integer overflows exist within the "i386_set_ldt()" and
"i386_get_ldt()" system calls, which can be exploited by malicious,
local users to execute arbitrary code with system privileges. 
Note: This does not affect PowerPC systems. 
7) An integer overflow error exists in the "inet_net_pton()" API of
Libsystem. This can potentially be exploited to e.g. compromise an
application using the vulnerable function. 
8) An unspecified error when processing certain input within the
"strptime()" API of Libsystem can be exploited to cause a memory
corruption and potentially execute arbitrary code by e.g. passing a
specially crafted date string to an application using the vulnerable
function. 
9) The "Managed Client" functionality does not always apply the
managed screen saver settings correctly, potentially resulting in
e.g. the screen saver lock not working as intended. 
10) An infinite loop when processing certain TCP packets exists in
natd, which can be exploited to cause a DoS by sending specially
crafted TCP packets to a vulnerable system. 
Successful exploitation requires that Internet Sharing is enabled. 
11) An unspecified error within the Podcast Producer server can be
exploited to bypass the authentication mechanism and access
administrative functions. 
12) An unspecified error within the handling of malformed UDF volumes
can be exploited to cause a system shutdown by e.g. opening a
specially crafted ISO file. 
Additionally, this update enhances the CoreTypes "Download
Validation" capability to detect and warn about more potentially
dangerous file types. 
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michael Samarin and Mikko Vihonen, Futurice
Ltd
2, 3, 8) Reported by the vendor. 
5) The vendor credits Richard Vaneeden, IOActive, Inc
6) The vendor credits Ben Loer, Princeton University
9) The vendor credits John Barnes of ESRI and Trevor Lalish-Menagh of
Tamman Technologies, Inc
10) The vendor credits Alex Rosenberg of Ohmantics and Gary Teter of
Paizo Publishing
12) The vendor credits Mauro Notarianni of PCAX Solutions
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT3338
OTHER REFERENCES:
SA32270:
http://secunia.com/advisories/32270/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
I. 
II. Impact
   The impacts of these vulnerabilities vary. Potential consequences
   include arbitrary code execution, sensitive information disclosure,
   denial of service, or privilege escalation. 
III. These and other updates are available via Software Update
   or via Apple Downloads. 
IV. Please send
   email to <cert@cert.org> with "TA08-350A Feedback VU#901332" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2008 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  
  December 15, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSUbT5nIHljM+H4irAQLfMggAvH7VNoR3th5dBLhuq/f43ka1G5cecyAK
g4gucF6+frxTfsVz2FGbawFdD/sAxAb/CnASFIkbuHItPwI526uy8MjXOmi/kYm2
ESZgD8U0OBtb2mqQRfhURz9sF97yVFhvHAZS3VOOCH85d1R6dr4ncxIWMGn2cgon
Cjlll1WTx2BuMZO/AFn2UM7OooV9VVXtMht9D48X7i9bCWoU2W0mFSCHr+bJPE3d
fI8v9+kyCQnjB3R9J+eGxmFClXl9PeMxOvsjPh/bQ8PpmAYMCH1Qp7vaSjjqSlVE
ljRuyK8e6TIirse/RoK0YOwqBWudpgyJZvsV89ft9v55+a0l+2UlJw==
=yvkk
-----END PGP SIGNATURE-----
                        
| VAR-200812-0476 | CVE-2008-5540 | Secure Computing Secure Web Gateway In HTML Vulnerabilities that prevent detection of malware in documents | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            Secure Computing Secure Web Gateway (aka Webwasher), when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. This vulnerability CVE-2006-5745 Can be reproduced with documents included in the exploit.First by a third party MZ By arranging the header and changing the file name to the following name, HTML May prevent detection of malware in the document. (1) No extension (2) .txt extension (3) .jpg extension. Webwasher) allows remote attackers by placing an MZ header (i.e. An example of exploiting this vulnerability is a document that contains an exploit for CVE-2006-5745
                        
| VAR-200812-0467 | CVE-2008-5531 | Fortinet Antivirus In HTML Vulnerabilities that prevent detection of malware in documents | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            Fortinet Antivirus 3.113.0.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. (1) No extension (2) .txt extension (3) .jpg extension. Fortiguard Antivirus is prone to a security bypass vulnerability. Fortinet Antivirus is an anti-virus software
                        
| VAR-200903-0035 | CVE-2008-6497 | Neostrada Livebox ADSL Router HTTP Request Denial of Service Vulnerability | 
                                      
                                        CVSS V2: 7.8 CVSS V3: - Severity: HIGH  | 
                            The Neostrada Livebox ADSL Router allows remote attackers to cause a denial of service (network outage) via multiple HTTP requests for the /- URI. Neostrada Livebox ADSL Router is prone to a denial-of-service vulnerability because it fails to adequately handle malformed HTTP requests. 
Successful exploits will deny service to legitimate users. Given the nature of this issue, remote code execution may be possible, but this has not been confirmed. Neostrada Livebox ADSL Router is a household ADSL access router provided by Polish telecom operators. ----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
http://secunia.com/advisories/business_solutions/
----------------------------------------------------------------------
TITLE:
Livebox TP Router HTTP Processing Denial of Service
SECUNIA ADVISORY ID:
SA33026
VERIFY ADVISORY:
http://secunia.com/advisories/33026/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From local network
OPERATING SYSTEM:
Livebox TP Router
http://secunia.com/advisories/product/17862/
DESCRIPTION:
0in has reported a vulnerability in Livebox TP Router, which can be
exploited by malicious people to cause a DoS (Denial of Service). 
SOLUTION:
Restrict HTTP access to trusted users only. 
PROVIDED AND/OR DISCOVERED BY:
0in
ORIGINAL ADVISORY:
http://milw0rm.com/exploits/7387
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-200902-0648 | CVE-2009-0656 | Asus SmartLogon In " Security function " Vulnerability to avoid | 
                                      
                                        CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM  | 
                            Asus SmartLogon 1.0.0005 allows physically proximate attackers to bypass "security functions" by presenting an image with a modified viewpoint that matches the posture of a stored image of the authorized notebook user. Face-recognition applications for multiple laptops are prone to an authentication-bypass vulnerability. 
An attacker can exploit this issue to gain unauthorized access to the affected device. 
This issue affects the following applications:
Lenovo Veriface III
Asus SmartLogon 1.0.0005
Toshiba Face Recognition 2.0.2.32