Apple updates Java for Mac OS X 10.5 and 10.6

The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 8 supersedes all previous updates of Java for Mac OS X 10.5. Java for Mac OS X 10.6 Update 3 supersedes the previous Java for Mac OS X 10.6.

Security content of Java for Mac OS X 10.5 Update 8

Multiple vulnerabilities exist in Java 1.6.0_20, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_22.

Multiple vulnerabilities exist in Java 1.5.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.5.0_26.

A command injection issue exists in updateSharingD’s handling of Mach RPC messages. A local user may be able to execute arbitrary code with the privileges of another user who runs a Java application. This issue is addressed by implementing a per-user Java shared archive.

A memory corruption issue exists in Java’s handling of applet window bounds. Visiting a web page containing a maliciously crafted Java applet tag may lead to an unexpected application termination or arbitrary code execution with the privileges of the current user. This issue is addressed through improved validation of window bounds.

Security content of Java for Mac OS X 10.6 Update 3

Multiple vulnerabilities exist in Java 1.6.0_20, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_22.

A command injection issue exists in updateSharingD’s handling of Mach RPC messages. A local user may be able to execute arbitrary code with the privileges of another user who runs a Java application. This issue is addressed by implementing a per-user Java shared archive. This issue only affects the Mac OS X implementation of Java.

A memory corruption issue exists in Java’s handling of applet window bounds. Visiting a web page containing a maliciously crafted Java applet tag may lead to an unexpected application termination or arbitrary code execution with the privileges of the current user. This issue is addressed through improved validation of window bounds. This issue only affects the Mac OS X implementation of Java.




Share this