SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Apple Xcode Vendors:   Apple
Apple Xcode May Disclose WebObjects Session IDs to Remote Users
SecurityTracker Alert ID:  1020473
SecurityTracker URL:  http://securitytracker.com/id/1020473
CVE Reference:   CVE-2008-2318   (Links to External Site)
Date:  Jul 12 2008
Impact:   Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 3.1
Description:   A vulnerability was reported in Apple Xcode. A remote user can determine WebObjects session IDs.

The WOHyperlink dynamic element generates URLs with a session ID appended to the URL. The session ID may be disclosed to other web sites.

Impact:   A remote user can determine obtain session IDs.
Solution:   The vendor has issued a fix (3.1), available from the Downloads section of the Apple Developer Connection Member site:

http://developer.apple.com/

The download file is named: "xcode31_2199_developerdvd.dmg"
Its SHA-1 digest is: e90f21f262dec5f1dae983e8fb53a613f2cc72b0

Vendor URL:  support.apple.com/kb/HT2352 (Links to External Site)
Cause:   Access control error
Underlying OS:  UNIX (macOS/OS X)
Underlying OS Comments:  10.5.x

Message History:   None.


 Source Message Contents

Subject:  APPLE-SA-2008-07-11 Xcode tools 3.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2008-07-11 Xcode tools 3.1

Xcode tools 3.1 is now available and addresses the following issues:

CoreImage Examples
CVE-ID:  CVE-2008-2304
Available for:  Mac OS X v10.5.x
Impact:  Opening a Fun House document may lead to an unexpected
application termination or arbitrary code execution
Description:  Xcode tools contain an example application called Core
Image Fun House that handles content with the ".funhouse" extension.
A buffer overflow may occur in this application when processing
".funhouse" files. Opening a maliciously-crafted ".funhouse" file may
lead to an unexpected application termination or arbitrary code
execution. This update addresses the issue through improved bounds
checking. Credit to Kevin Finisterre of Netragard for reporting this
issue.

WebObjects
CVE-ID:  CVE-2008-2318
Available for:  Mac OS X v10.5.x
Impact:  WebObjects session IDs may be disclosed to other web sites
Description:  WebObjects contains an API to generate URLs in HTML
documents via the WOHyperlink dynamic element. When WOHyperlink is
used, it always appends a session ID to the generated URL, even for
absolute URLs. Using WOHyperlink to create URLs that point at other
web sites may result in the disclosure of the current user's session
ID to those sites. This update addresses the issue by appending
session IDs to absolute URLs only when explicitly requested.

Xcode tools 3.1 may be obtained from the Downloads section of the
Apple Developer Connection Member site:  http://developer.apple.com/
Login is required, and membership is free.

The download file is named:  "xcode31_2199_developerdvd.dmg"
Its SHA-1 digest is:  e90f21f262dec5f1dae983e8fb53a613f2cc72b0

Information will also be posted to the Apple Security Updates
web site:  http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: 9.7.2.1608

wsBVAwUBSHgEAnkodeiKZIkBAQi+nAgAqVMExB6v6jae4vuxKL1VI/ZnZlh0+p84
gJYvgP7noHwEinVyX0xP/ntABviuHpwSCb31Ba66DiR5hHZcaOk7MLwKM/zKEfdN
CMUSMXiIb3WIe8adNZUAmybPET2DvlaMbsuB5IWoKdd0k2F7ko4YPT+HQ3Fe6OKd
Qn6F9RV9qjJgaEwVq8QxzPJ+vx2Ryr5kD/rbF7Za60ZsvJL0pbvS4dLiGXyDO5Wu
fJOmd4Nh+FtZdY8z8t3uaFpdy23hspiTQnYigjih3J8ASj3fWQJFKmR28elbT07v
foQwRKJE6oETOci8xtJUcOEQLdRvhVJ9bMD1CRBnzmSvbPEZaeWq3Q==
=98T5
-----END PGP SIGNATURE-----

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC