« iPod als iPod-Dock | Start | Nachträge zu iPod Hi-Fi, iTV, Core 2 Duo, Mobiltelefon, Zune, Ive »

21.09.2006

Apple veröffentlicht Security Update 2006-005 und AirPort Update 2006-001

Ein Sicherheitsupdate für AirPort steht ab sofort über die Softwareaktualisierung zum Download bereit. Alternativ kann es über apple.com bezogen werden für 10.4.7 (PPC), 10.4.7 (Universal) und 10.3.9. Wer auf seinem Intel-Mac 10.4.7 Build 8J2135 oder 8J2135a einsetzt, sollte stattdessen zum AirPort Update 2006-001 greifen. Es ist nur eine der beiden Aktualisierungen nötig - also entweder das Security Update 2006-005 oder eben das AirPort Update 2006-001 speziell für 10.4.7 Build 8J2135(a). Die Updates sind jeweils rund 1-2 MB groß, Neustart ist sowieso erfoderlich. Das AirPort Update 2006-001 soll zudem unstete Funknetzverbindungen bei manchen MacBook Pros beheben. Damit dürfte eine der ermüdendsten Debatten endlich ihr Ende finden (oder kurzfristig neu aufflammen). Apples Aussage zum Sicherheitsupdate ist jedenfalls unzweideutig: «“They did not supply us with any information to allow us to identify a specific problem, so we initiated an internal audit,”» sagte ein Apple Sprecher gegenüber der Macworld. «“Today’s update preemptively strengthens our drivers against potential vulnerabilities, and while it addresses issues found internally by Apple, we are open to hearing from security researchers on how to improve security on the Mac.”» Die gestopften Lücken nach dem Klick.

AirPort
CVE-ID:  CVE-2006-3507
Available for:  Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS
X v10.4.7, Mac OS X Server v10.4.7
Impact:  Attackers on the wireless network may cause arbitrary
code execution
Description:  Two separate stack buffer overflows exist in the
AirPort wireless driver's handling of malformed frames. An
attacker in local proximity may be able to trigger an overflow
by injecting a maliciously-crafted frame into a wireless
network. When the AirPort card is on, this could lead to arbitrary
code execution with system privileges. This issue affects Power
Mac, PowerBook, iMac, Mac Pro, Xserve, and PowerPC-based Mac
mini computers equipped with wireless. Intel-based Mac mini,
MacBook, and MacBook Pro computers are not affected. There is no
known exploit for this issue. This update addresses the issues
by performing additional validation of wireless frames.

AirPort
CVE-ID:  CVE-2006-3508
Available for:  Mac OS X v10.4.7, Mac OS X Server v10.4.7
Impact:  Attackers on the wireless network may cause system
crashes, privilege elevation, or arbitrary code execution
Description:  A heap buffer overflow exists in the AirPort
wireless driver's handling of scan cache updates. An attacker in
local proximity may be able to trigger the overflow by injecting
a maliciously-crafted frame into the wireless network. This
could lead to a system crash, privilege elevation, or arbitrary
code execution with system privileges. This issue affects
Intel-based Mac mini, MacBook, and MacBook Pro computers
equipped with wireless. Power Mac, PowerBook, iMac, Mac Pro,
Xserve, and PowerPC-based Mac mini computers are not affected.
This update addresses the issue by performing additional
validation of wireless frames. There is no known exploit for
this issue. This issue does not affect systems prior to Mac OS X
v10.4.

AirPort
CVE-ID:  CVE-2006-3509
Available for:  Mac OS X v10.4.7, Mac OS X Server v10.4.7
Impact:  Depending upon third-party wireless software in use,
attackers on the wireless network may cause crashes or arbitrary
code execution
Description:  An integer overflow exists in the AirPort wireless
driver's API for third-party wireless software. This could lead
to a buffer overflow in such applications dependent upon API
usage. No applications are known to be affected at this time. If
an application is affected, then an attacker in local proximity
may be able to trigger an overflow by injecting a
maliciously-crafted frame into the wireless network. This may
cause crashes or lead to arbitrary code execution with the
privileges of the user running the application. This issue
affects Intel-based Mac mini, MacBook, and MacBook Pro computers
equipped with wireless. Power Mac, PowerBook, iMac, Mac Pro,
Xserve, and PowerPC-based Mac mini computers are not affected.
This update addresses the issues by performing additional
validation of wireless frames. There is no known exploit for
this issue. This issue does not affect systems prior to Mac OS X
v10.4. Inzwischen auch im entsprechenden Supportdokument nachzulesen.

Posted by Leo at 22:46 | Permalink

TrackBack

TrackBack-Adresse für diesen Eintrag:
https://www.typepad.com/services/trackback/6a00d83451c7b569e200d834e9d4fd69e2

Listed below are links to weblogs that reference Apple veröffentlicht Security Update 2006-005 und AirPort Update 2006-001: