Avis du CERT RENATER

Par défaut, cette page vous affichera les derniers messages envoyés par le CERT RENATER à la communauté. Vous pouvez affiner par année ou par type de message. Si aucun critère n'est précisé, seuls les derniers messages sont affichés
Date : Fri, 04 Sep 2009 11:51:02 +0200
Type : VULN
Sujet : CERT-Renater : 2009/VULN342 (APPLE: APPLE-SA-2009-09-03-1 Java for Mac OS X 10.5 Update 5)
====================================================================                                   CERT-Renater

                        Note d'Information No. 2009/VULN342
_____________________________________________________________________

DATE                      : 04/09/2009

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Mac OS X 10.5 running Java.

======================================================================
http://support.apple.com/kb/HT3851
______________________________________________________________________

APPLE-SA-2009-09-03-1 Java for Mac OS X 10.5 Update 5

Java for Mac OS X 10.5 Update 5 is now available and addresses the
following:

Java
CVE-ID:  2009-2475, 2009-2476, 2009-2670, 2009-2690, 2009-0217,
2009-2671, 2009-2672, 2009-2673, 2009-2674, 2009-2689, 2009-2675,
2009-2625
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact:  Multiple vulnerabilities in Java 1.6.0_13
Description:  Multiple vulnerabilities exist in Java 1.6.0_13, the
most serious of which may allow an untrusted Java applet to obtain
elevated privileges. Visiting a web page containing a maliciously
crafted untrusted Java applet may lead to arbitrary code execution
with the privileges of the current user. These issues are addressed
by updating to Java version 1.6.0_15. Further information is
available via the Sun Java website at
http://java.sun.com/javase/6/webnotes/ReleaseNotes.html

Java
CVE-ID:  2009-2722, 2009-2723, 2009-2475, 2009-2670, 2009-2690,
2009-2671, 2009-2672, 2009-2673, 2009-2689, 2009-2675, 2009-2625
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact:  Multiple vulnerabilities in Java 1.5.0_19
Description:  Multiple vulnerabilities exist in Java 1.5.0_19, the
most serious of which may allow an untrusted Java applet to obtain
elevated privileges. Visiting a web page containing a maliciously
crafted untrusted Java applet may lead to arbitrary code execution
with the privileges of the current user. These issues are addressed
by updating to Java version 1.5.0_20. Further information is
available via the Sun Java website at
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html

Java
CVE-ID:  2009-2475, 2009-2689
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact:  Multiple vulnerabilities in Java 1.4.2_21
Description:  Multiple vulnerabilities exist in Java 1.4.2_21, the
most serious of which may allow an untrusted Java applet to obtain
elevated privileges. Visiting a web page containing a maliciously
crafted untrusted Java applet may lead to arbitrary code execution
with the privileges of the current user. These issues are addressed
by updating to Java version 1.4.2_22. Further information is
available via the Sun Java website at
http://java.sun.com/j2se/1.4.2/ReleaseNotes.html

Java
CVE-ID:  CVE-2009-2205
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact:  Launching a maliciously crafted Java Web Start application
may lead to an unexpected application termination or arbitrary code
execution
Description:  A stack buffer overflow exists in Java Web Start
command launcher. Launching a maliciously crafted Java Web Start
application may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue through
improved bounds checking. Credit to Chris Ries of Carnegie Mellon
University Computing Services for reporting this issue.


Java for Mac OS X 10.5 Update 5 may be obtained from the Software
Update pane in System Preferences, or Apple's Software Downloads
web site: http://www.apple.com/support/downloads/

The download file is named: JavaForMacOSX10.5Update5.dmg
Its SHA-1 digest is: 20dd590192fb81a8f164b73727295ed2ac4f1693

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

======================================================================

          =========================================================
          Les serveurs de référence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================