U radu programske podrške uređaja Time Capsule i AirPort Base Station (802.11n) uočen je novi sigurnosni propust. Udaljeni ga napadač može iskoristiti za proizvoljno pokretanje programskog koda.
Paket:
Apple Airport Express , Apple Airport Extreme , Apple Time Capsule
Operacijski sustavi:
Apple Mac OS X 10, Apple Mac OS X 10.1, Apple Mac OS X 10.2, Apple Mac OS X 10.3, Apple Mac OS X 10.4, Apple Mac OS X 10.5, Apple Mac OS X 10.7
Kritičnost:
5.5
Problem:
neodgovarajuća provjera ulaznih podataka
Iskorištavanje:
udaljeno
Posljedica:
proizvoljno izvršavanje programskog koda
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-0997
Izvorni ID preporuke:
APPLE-SA-2011-11-10
Izvor:
Apple
Problem:
Sigurnosni propust je posljedica neodgovarajuće provjere ulaznih DHCP poruka.
Posljedica:
Udaljeni napadač navedenu ranjivost može iskoristiti za proizvoljno pokretanje programskog koda.
Rješenje:
Svim se korisnicima savjetuje korištenje dostupnih nadogradnji.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n)
Firmware 7.6
Time Capsule and AirPort Base Station (802.11n) Firmware 7.6 is now
available and addresses the following:
Available for: AirPort Extreme Base Station with 802.11n,
AirPort Express Base Station with 802.11n, Time Capsule
Impact: An attacker in a privileged network position may be able to
cause arbitrary command execution via malicious DHCP responses
Description: dhclient allowed remote attackers to execute arbitrary
commands via shell metacharacters in a hostname obtained from a DHCP
message. This issue is addressed by stripping shell meta-characters
in dhclient-script.
CVE-ID
CVE-2011-0997 : Sebastian Krahmer and Marius Tomaschewski of the SUSE
Security Team working with ISC
Installation note for Firmware version 7.6
Firmware version 7.6 is installed into Time Capsule or AirPort Base
Station with 802.11n via AirPort Utility, provided with the device.
It is recommended that AirPort Utility 5.5.3 or later be installed
before upgrading to Firmware version 7.6.
AirPort Utility 5.5.3 or later may be obtained through Apple's
Software Download site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.16 (Darwin)
iQEcBAEBAgAGBQJOusONAAoJEGnF2JsdZQeerVcH/iuka+0teMpSn6bPJTzMuqy2
ea0cB1CwysYQwasw7sR1tAlUmhy1P8JPdLh8yTsb052JaRRbJ2deh3IlJealW/3q
HQgnp20rIwCPVu5m2BUWz02NIJYBHrmpl27/mNYPItQhm4ql6ma+8oBiBvzz7LGW
5/1urVr3R3rtFO+AGNnULbPNOkFfLR9+iHe0XOUEVSaKGIOF4XnZ8t/9c+/Odf/d
y3HerbAEY54ZG6IpUMvErr73IZD1bQGxqUEbclUmqxM/H0wydJrlqRgKT34rkQut
3o/yoPP+qKb0EJNQ8b0lKasIFW//aAT4ArKOlb5WW/NXeatvvhyUeO2GfZqpk5U=
=HQYl
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.)
Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/security-announce/advisory%40lss.hr
This email sent to Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke