Date: 17 April 2013
References: ASB-2013.0057 ASB-2013.0058 ESB-2013.0549 ESB-2013.0558 ESB-2013.0559
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2013.0545
Java for OS X 2013-003 and Mac OS X v10.6 Update 15
17 April 2013
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Java
Publisher: Apple
Operating System: OS X
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Modify Arbitrary Files -- Remote/Unauthenticated
Delete Arbitrary Files -- Remote/Unauthenticated
Denial of Service -- Remote/Unauthenticated
Access Confidential Data -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2013-2440 CVE-2013-2437 CVE-2013-2435
CVE-2013-2432 CVE-2013-2430 CVE-2013-2429
CVE-2013-2424 CVE-2013-2422 CVE-2013-2420
CVE-2013-2419 CVE-2013-2417 CVE-2013-2394
CVE-2013-2384 CVE-2013-2383 CVE-2013-1569
CVE-2013-1563 CVE-2013-1558 CVE-2013-1557
CVE-2013-1540 CVE-2013-1537 CVE-2013-1491
Reference: ASB-2013.0057
ASB-2013.0058
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2013-04-16-2 Java for OS X 2013-003 and
Mac OS X v10.6 Update 15
Java for OS X 2013-003 and Mac OS X v10.6 Update 15 are now available
and address the following:
Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7 or later, OS X Lion Server v10.7 or later,
OS X Mountain Lion 10.8 or later
Impact: Multiple vulnerabilities in Java 1.6.0_43
Description: Multiple vulnerabilities existed in Java 1.6.0_43, the
most serious of which may allow an untrusted Java applet to execute
arbitrary code outside the Java sandbox. Visiting a web page
containing a maliciously crafted untrusted Java applet may lead to
arbitrary code execution with the privileges of the current user.
These issues were addressed by updating to Java version 1.6.0_45.
Further information is available via the Java website at http://www.o
racle.com/technetwork/java/javase/releasenotes-136954.html
CVE-ID
CVE-2013-1491
CVE-2013-1537
CVE-2013-1540
CVE-2013-1557
CVE-2013-1558
CVE-2013-1563
CVE-2013-1569
CVE-2013-2383
CVE-2013-2384
CVE-2013-2394
CVE-2013-2417
CVE-2013-2419
CVE-2013-2420
CVE-2013-2422
CVE-2013-2424
CVE-2013-2429
CVE-2013-2430
CVE-2013-2432
CVE-2013-2435
CVE-2013-2437
CVE-2013-2440
Java for OS X 2013-003 and Mac OS X v10.6 Update 15
may be obtained from the Software Update pane in System Preferences,
Mac App Store, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
For Mac OS X v10.6 systems
The download file is named: JavaForMacOSX10.6.Update15.dmg
Its SHA-1 digest is: 56a950f7a89f2a1c39de01b2b1998986f132be57
For OS X Lion and Mountain Lion systems
The download file is named: JavaForOSX2013-003.dmg
Its SHA-1 digest is: 3393ff8642b6e29cacaf10fbb04f76e657cc313a
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org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=bvDt
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=Z24T
-----END PGP SIGNATURE-----
|