Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: InfoSec Handlers Diary Blog - Internet Storm Center Diary 2007-05-02 InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

APPLE-SA-2007-05-01 Security Update 2007-004 v1.1

Published: 2007-05-02
Last Updated: 2007-05-02 02:27:44 UTC
by Chris Carboni (Version: 1)
0 comment(s)
In addition to the Quicktime patches, Apple also released APPLE-SA-2007-05-01 Security Update 2007-004 v1.1 which contains the following:

Security Update 2007-004 v1.1 includes the contents of Security Update 2007-004, plus the following fixes:

AirPort

Available for: Mac OS X v10.3.9

This update corrects an issue where the AirPort connection may be lost after waking from sleep. This issue only affects Mac OS X v10.3.9 with Security Update 2007-004.

FTPServer

CVE-ID: CVE-2007-0745

Available for: Mac OS X Server v10.4.9

Impact: Users with ftp access may be able to navigate to directories outside the normal scope

Description: Security Update 2007-004 applied an incorrect ftp configuration file for Mac OS X Server v10.4.9 systems. Users with ftp access, who would normally be restricted to certain directories, may be able to access directories outside the normal scope. This update addresses the issue by restoring the correct version of the ftp configuration file. This issue only affects Mac OS X Server v10.4.9 with Security Update 2007-004.

Mac OS X 10.4.9 (client) and Mac OS X Server 10.3.9 systems that have installed Security Update 2007-004 do not require Security Update 2007-004 v1.1. If the security update has not yet been installed on these systems, then they should be updated using Security Update 2007-004 v1.1.

Security Update 2007-004 v1.1 may be obtained from the Software
Update pane in System Preferences, or Apple's Software Downloads web
site: http://www.apple.com/support/downloads/

For Mac OS X v10.4.9 (PowerPC) and Mac OS X Server v10.4.9 (PowerPC)
The download file is named: "SecUpd2007-004Ti.dmg"
Its SHA-1 digest is: 60319316b3eba0de37f7ea747e59decfafe1ea81

For Mac OS X v10.4.9 (Universal) and
Mac OS X Server v10.4.9 (Universal)
The download file is named: "SecUpd2007-004Univ.dmg"
Its SHA-1 digest is: fb6ec6a7d8729bd21d1431192ecb7665e9fd2b80

For Mac OS X v10.3.9
The download file is named: "SecUpd2007-004Pan.dmg"
Its SHA-1 digest is: 39b9be13a82ea546f18ff4958cfd69b0d37947e8

Original announcement http://docs.info.apple.com/article.html?artnum=61798

-Chris
Keywords:
0 comment(s)

Winamp 0-day

Published: 2007-05-02
Last Updated: 2007-05-02 02:26:45 UTC
by Chris Carboni (Version: 1)
0 comment(s)
A remote code execution vulnerability and exploit for Winamp 5.34 has been released.

The vulnerability exists within Winamp's MP4 decoding.  Successful exploitation will allow an attacker to execute arbitrary code under the context of the logged in user.

After install Winamp is associated with .MP4 files. However, Winamp does not open .MP4 files embedded within websites. This forces would-be attackers to deliver the .MP4 directly to the user’s host. E-mail or a website link that would require the download of the .MP4 file in order to play are the most likely exploit vectors.

Removal of the association of .MP4 files to Winamp will mitigate this vulnerability until a vendor supplied patch is available.

-Chris
Keywords:
0 comment(s)

Quicktime patches up to 7.1.6

Published: 2007-05-02
Last Updated: 2007-05-02 01:07:22 UTC
by Joel Esler (Version: 1)
0 comment(s)
Thanks all for writing in, we've been patching ourselves.

Quicktime's update for the vulnerability discovered at CanSecWest came out today.  Yes, this is the now-infamous Java/Quicktime/Browser vulnerability that Dino Dai Zovi discovered during the "pwn-2-own" contest, that TippingPoint bought for 10,000 dollars for their Zero-Day initiative.  This was initially covered by Deb Hale back in this diary.

If you have been following the blog over at Matasano Chargen where Thomas Ptacek has been doing a great job covering it on the Matasano blog: http://www.matasano.com/log/
(This is one of those blogs that you should put in your rss reader if you have one)

Apple's writeup on this says:
  • QuickTime

    CVE-ID: CVE-2007-2175

    Available for: Mac OS X v10.3.9, Mac OS X v10.4.9, Windows XP SP2, Windows 2000 SP4

    Impact: Visiting a malicious website may lead to arbitrary code execution

    Description: An implementation issue exists in QuickTime for Java, which may allow reading or writing out of the bounds of the allocated heap. By enticing a user to visit a web page containing a maliciously-crafted Java applet, an attacker can trigger the issue which may lead to arbitrary code execution. This update addresses the issue by performing additional bounds checking when creating QTPointerRef objects. Credit to Dino Dai Zovi working with TippingPoint and the Zero Day Initiative for reporting this issue.


Time to update!  12 days to put out an update for Apple.  Not too bad.
(Yes, I am an Apple Fanboy)

Joel Esler
http://handlers.sans.org/jesler
Keywords:
0 comment(s)
Diary Archives