SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   Mac OS X Vendors:   Apple Computer
Mac OS X AppKit Document Processing Bug Lets Users Execute Arbitrary Code
SecurityTracker Alert ID:  1020131
SecurityTracker URL:  http://securitytracker.com/id/1020131
CVE Reference:   CVE-2008-1028   (Links to External Site)
Date:  May 29 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.4.x
Description:   A vulnerability was reported in Mac OS X. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted document file that, when loaded by the target user with an application that uses AppKit, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

TextEdit is affected.

Systems running Mac OS X 10.5 and later are not affected.

Rosyna of Unsanity reported this vulnerability.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix as part of Security Update 2008-003 and Mac OS X v10.5.3, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

The Software Update utility will present the update that applies to your system configuration. Only one is needed, either Security Update 2008-003 or Mac OS X v10.5.3.

For Mac OS X v10.5.2
The download file is named: "MacOSXUpd10.5.3.dmg"
Its SHA-1 digest is: 017ef905e5653b04e2455da261e804a72bf40139

For Mac OS X v10.5 - v10.5.1
The download file is named: "MacOSXUpdCombo10.5.3.dmg"
Its SHA-1 digest is: 69acd7399de25f1548675d660fdf24eb401e3de3

For Mac OS X Server v10.5.2
The download file is named: "MacOSXServerUpd10.5.3.dmg"
Its SHA-1 digest is: 336c9dceca724eab0b8c9db3943be3f9ecf244a4

For Mac OS X Server v10.5 - v10.5.1
The download file is named: "MacOSXServerUpdCombo10.5.3.dmg"
Its SHA-1 digest is: fdb2187d19ce21caecd3c3ba6b6fa6f65c9c3a4f

For Mac OS X v10.4.11 (Intel)
The download file is named: "SecUpd2008-003Intel.dmg"
Its SHA-1 digest is: 8f84d2f757c2fb277b139f72ef501dc894620e97

For Mac OS X v10.4.11 (PowerPC)
The download file is named: "SecUpd2008-003PPC.dmg"
Its SHA-1 digest is: 51e98d988c5bb09d4b1052199d90a9d65af7c8e7

For Mac OS X Server v10.4.11 (Universal)
The download file is named: "SecUpdSrvr2008-003Univ.dmg"
Its SHA-1 digest is: 337a05956b5a6e962b286a91beee9eb217a0175c

For Mac OS X Server v10.4.11 (PowerPC)
The download file is named: "SecUpdSrvr2008-003PPC.dmg"
Its SHA-1 digest is: 94cab2b4e5d26a284c5d91d0fe4dc20b4e9cfc97

The vendor's advisory is available at:

http://support.apple.com/kb/HT1897

Vendor URL:  support.apple.com/kb/HT1897 (Links to External Site)
Cause:   Not specified
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Wed, 28 May 2008 15:59:23 -0700
Subject:  APPLE-SA-2008-05-28 Security Update 2008-003 and Mac OS X v10.5.3

AppKit
CVE-ID:  CVE-2008-1028
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact:  Opening a maliciously crafted file may lead to an unexpected
application termination or arbitrary code execution
Description:  An implementation issue exists in AppKit's processing
of document files. Opening a maliciously crafted file in an editor
that uses AppKit, such as TextEdit, may cause an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved validation of document files.
This issue does not affect systems running Mac OS X 10.5 or later.
Credit to Rosyna of Unsanity for reporting this issue.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC