Apple released security update 2008-001

The fresh security update addresses the following:

Directory Services – A local user may be able to execute arbitrary code with system privileges.

A stack buffer overflow exists in the Service Location Protocol (SLP) daemon, which may allow a local user to execute arbitrary code with system privileges. This update addresses the issue through improved bounds checking. This has been described on the Month of Apple Bugs web site (MOAB-17-01-2007). This issue does not affect systems running Mac OS X v10.5 or later.

Foundation – Accessing a maliciously crafted URL may lead to an application termination or arbitrary code execution.

A memory corruption issue exists in Safari’s handling of URLs. By enticing a user to access a maliciously crafted URL, an attacker may cause an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of URLs. This issue does not affect systems prior to Mac OS X v10.5.

Launch Services – An application removed from the system may still be launched via the Time Machine backup.

Launch Services is an API to open applications or their document files or URLs in a way similar to the Finder or the Dock. Users expect that uninstalling an application from their system will prevent it from being launched. However, when an application has been uninstalled from the system, Launch Services may allow it to be launched if it is present in a Time Machine backup. This update addresses the issue by not allowing applications to be launched directly from a Time Machine backup. This issue does not affect systems prior to Mac OS X v10.5.

Mail – Accessing a URL in a message may lead to arbitrary code execution.

An implementation issue exists in Mail’s handling of file:// URLs, which may allow arbitrary applications to be launched without warning when a user clicks a URL in a message. This update addresses the issue by displaying the location of the file in Finder rather than launching it. This issue does not affect systems running Mac OS X v10.5 or later.

NFS – If the system is being used as an NFS client or server, a remote attacker may cause an unexpected system shutdown or arbitrary code execution.

A memory corruption issue exists in NFS’s handling of mbuf chains. If the system is being used as an NFS client or server, a malicious NFS server or client may be able to cause an unexpected system shutdown or arbitrary code execution. This update addresses the issue through improved handling of mbuf chains. This issue does not affect systems prior to Mac OS X v10.5.

Open Directory – NTLM authentication requests may always fail.

This update addresses a non-security issue introduced in Mac OS X v10.4.11. An race condition in Open Directory’s Active Directory plug-in may terminate the operation of winbindd, causing NTLM authentications to fail. This update addresses the issue by correcting the race condition that could terminate winbindd. This issue only affects Mac OS X v10.4.11 systems configured for use with Active Directory.

Parental Controls – Requesting to unblock a website leads to information disclosure.

When set to manage web content, Parental Controls will inadvertently contact www.apple.com when a website is unblocked. This allows a remote user to detect the machines running Parental Controls. This update addresses the issue by removing the outgoing network traffic when a website is unblocked. This issue does not affect systems prior to Mac OS X v10.5.

Samba – A remote attacker may cause an unexpected application termination or arbitrary code execution.

A stack buffer overflow may occur in Samba when processing certain NetBIOS Name Service requests. If a system is explicitly configured to allow “domain logons”, an unexpected application termination or arbitrary code execution could occur when processing a request. Mac OS X Server systems configured as domain controllers are also affected. This update addresses the issue by applying the Samba patch.

Terminal – Viewing a maliciously crafted web page may lead to arbitrary code execution.
An input validation issue exists in the processing of URL schemes handled by Terminal.app. By enticing a user to visit a maliciously crafted web page, an attacker may cause an application to be launched with controlled command line arguments, which may lead to arbitrary code execution. This update addresses the issue through improved validation of URLs.

X11 – Multiple Vulnerabilities exist in X11 X Font Server (XFS) 1.0.4.

Multiple vulnerabilities in X11 X Font Server (XFS), the most serious of which may lead to arbitrary code execution. This update addresses the issue by updating to version 1.0.5.

X11 – Changing the settings in the Security Preferences Panel has no effect.

The X11 server is not reading correctly its “Allow connections from network client” preference, which can cause the X11 server to allow connections from network clients, even when the preference is turned off. This update addresses the issue by ensuring the X11 server reads its preferences correctly.

The update can be downloaded and installed via Software Update preferences, or from Apple Downloads: Universal – PPC.

Don't miss