mailing list archives
TA06-132A -- Apple Mac Products Affected by Multiple Vulnerabilities
From: CERT Advisory <cert-advisory () cert org>
Date: Sat, 13 May 2006 10:29:54 -0400
-----BEGIN PGP SIGNED MESSAGE-----
National Cyber Alert System
Technical Cyber Security Alert TA06-132A
Apple Mac Products Affected by Multiple Vulnerabilities
Original release date: May 12, 2006
Last revised: --
* Apple Mac OS X version 10.3.9 (Panther) and version 10.4.6 (Tiger)
* Apple Mac OS X Server version 10.3.9 and version 10.4.6
* Apple Safari web browser
* Apple Mail
Previous versions of Mac OS X may also be affected. Please see Apple
Security Update 2006-003 for further information.
Apple has released Security Update 2006-003 to correct multiple
vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web
browser, Mail, and other products. The most serious of these
vulnerabilities may allow a remote attacker to execute arbitrary code.
Impacts of other vulnerabilities include bypassing security
restrictions and denial of service.
Apple Security Update 2006-003 resolves a number of vulnerabilities
affecting Mac OS X, OS X Server, Safari web browser, Mail, and other
products. Further details are available in the individual
The impacts of these vulnerabilities vary. For information about
specific impacts, please see the Vulnerability Notes. Potential
consequences include remote execution of arbitrary code or commands,
bypass of security restrictions, and denial of service.
Install an update
Install Apple Security Update 2006-003. This and other updates are
available via Apple Update.
Disable "Open 'safe' files after downloading"
For additional protection, disable the option to "Open 'safe' files
after downloading," as specified in "Securing Your Web Browser."
Appendix A. References
* Securing Your Web Browser -
* Apple Security Update 2006-003 -
* Mac OS X: Updating your software -
These vulnerabilities were reported in Apple Security Update 2006-003.
Please see the Vulnerability Notes for individual reporter
The most recent version of this document can be found at:
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert () cert org> with "TA06-132A Feedback VU#519473" in the
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
Produced 2006 by US-CERT, a government organization.
May 12, 2006: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
-----END PGP SIGNATURE-----
- TA06-132A -- Apple Mac Products Affected by Multiple Vulnerabilities CERT Advisory (May 13)