SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Apple iWork Vendors:   Apple
(Apple Issues Fix for iWork) Mac OS X Lets Remote Users Execute Arbitrary Code, Deny Service, and Obtain Information
SecurityTracker Alert ID:  1025838
SecurityTracker URL:  http://securitytracker.com/id/1025838
CVE Reference:   CVE-2010-3785, CVE-2010-3786   (Links to External Site)
Date:  Jul 25 2011
Impact:   Denial of service via local system, Denial of service via network, Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.0 through 9.0.5
Description:   Multiple vulnerabilities were reported in Mac OS X. A remote or remote authenticated user can execute arbitrary code on the target system. A remote or local user can cause denial of service conditions. A remote user can obtain potentially sensitive information.

A remote user can trigger a null pointer dereference and cause the target AFP Server to shutdown [CVE-2010-1828].

A remote authenticated user can exploit a directory traversal flaw to create files and cause arbitrary code execution [CVE-2010-1829].

A remote user can determine the existence of an AFP share [CVE-2010-1830].

A remote user can trigger a buffer overflow in AppKit [CVE-2010-1842]. Jesse Ruderman of Mozilla Corporation reported this vulnerability.

A remote user can create a specially crafted font, document, disk image, or web page that, when loaded by the target user, will execute arbitrary code [CVE-2010-1811, CVE-2010-1831, CVE-2010-1832, CVE-2010-1833, CVE-2010-1797, CVE-2010-1752, CVE-2010-1834, CVE-2010-1836, CVE-2010-1837, CVE-2010-1841, CVE-2010-1844, CVE-2010-1845, CVE-2010-1846, CVE-2010-3785, CVE-2010-3786, CVE-2010-3798].

Marc Schoenefeld of Red Hat, Christoph Diehl of Mozilla, Matias Eissler and Anibal Sacco of Core Security Technologies, Laurent OUDOT of TEHTRI-Security, Neil Fryer of IT Security Geeks, Andrew Kiss, Tobias Klein via iDefense VCP, Steven Fisher of Discovery Software Ltd., and Dominic Chell of NGSSoftware reported these vulnerabilities.

A local user can bypass the Directory Service password validation and login to a mobile account [CVE-2010-1838].

A remote user can trigger a stack buffer overflow in Directory Services in the validation of password data to execute arbitrary code [CVE-2010-1840]. Rodrigo Rubira Branco from Check Point Vulnerability Discovery Team (VDT) and Rainer Mueller reported this vulnerability.

A local user can exploit a flaw in diskdev_cmds to prevent the system from starting properly [CVE-2010-0105]. Maksymilian Arciemowicz of SecurityReason reported this vulnerability.

A local user can exploit a flaw in the handling of terminal devices to trigger a memory management error and cause the system to shutdown [CVE-2010-1847].

A remote user can send specially crafted Protocol Independent Multicast (PIM) packets to trigger a null pointer dereference and cause the target system to shutdown [CVE-2010-1843]. An anonymous researcher reported this vulnerability via TippingPoint's Zero Day Initiative.

A remote attacker can login with an outdated password due to a Password Server replication flaw [CVE-2010-3783].

A remote user can send specially crafted XML data to applications using the PMPageFormatCreateWithDataRepresentation API to trigger a null dereference and cause the target application to crash [CVE-2010-3784]. Wujun Li of Microsoft reported this vulnerability.

A remote attacker can access a target user's Time Machine information [CVE-2010-1803].

A remote user that can edit wiki pages can inject javascript to obtain the credentials of a target user [CVE-2010-3797].

Impact:   A remote user or remote authenticated user can execute arbitrary code on the target system.

A remote or local user can cause denial of service conditions.

A local user can login to a mobile account.

A remote user can obtain Time Machine information.

A remote user can obtain a target user's Wiki Server credentials.

Solution:   Apple has issued a fix for CVE-2010-3785 and CVE-2010-3786 for Apple iWork (9.1).

The Apple advisory is available at:

http://support.apple.com/kb/HT4830

Vendor URL:  support.apple.com/kb/HT4435 (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  UNIX (macOS/OS X)

Message History:   This archive entry is a follow-up to the message listed below.
Nov 11 2010 Mac OS X Lets Remote Users Execute Arbitrary Code, Deny Service, and Obtain Information



 Source Message Contents

Subject:  APPLE-SA-2011-07-20-2 iWork 9.1 Update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2011-07-20-2 iWork 9.1 Update

iWork 9.1 Update is now available and addresses the following:

Numbers
Available for:  iWork 9.0 through 9.0.5
Impact:  Opening a maliciously crafted Excel file may lead to an
unexpected application termination or arbitrary code execution
Description:  A buffer overflow existed in the handling of Excel
files. Opening a maliciously crafted Excel file in Numbers may lead
to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2010-3785 : Apple

Numbers
Available for:  iWork 9.0 through 9.0.5
Impact:  Opening a maliciously crafted Excel file may lead to an
unexpected application termination or arbitrary code execution
Description:  A memory corruption issue existed in the handling of
Excel files. Opening a maliciously crafted Excel file in Numbers may
lead to an unexpected application termination or arbitrary code
execution.
CVE-ID
CVE-2010-3786 : Tobias Klein, working with VeriSign iDefense Labs

Pages
Available for:  iWork 9.0 through 9.0.5
Impact:  Opening a maliciously crafted Microsoft Word document may
lead to an unexpected application termination or arbitrary code
execution
Description:  A memory corruption issue existed in the handling of
Microsoft Word documents. Opening a maliciously crafted Microsoft
Word document in Pages may lead to an unexpected application
termination or arbitrary code execution.
CVE-ID
CVE-2011-1417 : Charlie Miller and Dion Blazakis working with
TippingPoint's Zero Day Initiative


iWork 9.1 Update is available via the Apple Software Update
application, or  Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

The download file is named: iWork9.1Update.dmg
Its SHA-1 digest is: ecb38db74d7d1954cbcee9220c73dac85cace3e1

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)

iQEcBAEBAgAGBQJOKcGrAAoJEGnF2JsdZQeewcYH/RhHdLa6x14PX+ZTC+sm1Mjc
W1xBpOxMuBpAx3Li6INXXLvMablTgPIs5e3pbtsV0RYtsJy99JdPySPI8bpQu0Si
CVWuXXSBYy2gdTtRAf6MI3j+oOyM1JhE7GunLBWcmAzv5TxS8TRf0HtNErFEe8NA
StV8QBWLErNyHxqjUQsIb5d1KbIbOysFQZy3O6pyZ6SRwr8tlIPKnY4KsaDYS5Ry
tpv3lMysde5NqCy8BeOQEtW/WAmE7i9NCCNfU2L+OfGQOXIdXmKl7Orjj+d9l23L
umGo9GCACvBVO1Ot6jKDlCW+ZuDRGuz+fhQnwOdyoqtwUwiNCsS6VIwuYYrcmxw=
=wrny
-----END PGP SIGNATURE-----

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC