A sweeping Mac OS X security update fixes several code execution holes in Apple's flagship browser.
Apple Computer Inc. late Tuesday shipped a massive Mac OS X update to correct security flaws in several Internet-facing components, including multiple code execution bugs in the Safari Web browser.
In all, Apples Security Update 2005-009
addresses 13 vulnerabilities affecting Mac OS X (client and server).
Security alerts aggregator Secunia Inc. rated the update as "highly critical" and warned that malicious hackers could exploit the flaws to launch security bypass, cross-site scripting, spoofing, data manipulation, information exposure, denial-of-service and system access attacks.
Two of the four Safari patches can lead to arbitrary code execution, Apple acknowledged in an alert.
Safari users visiting malicious Web sites with WebKit-based applications are also at risk of code execution attacks because of a heap overflow in WebKit, Apple said. The overflow may be triggered by content downloaded from malicious Web sites in applications that use WebKit.
Click here to read about previous security flaws in the Safari Web browser.
A third bug in Safari may cause the browser to download files outside of the designated download directory. When files are downloaded in Safari, Apple said, they are normally placed in the location specified as the download directory.
However, if a Web site suggests an overlong filename for a download, it is possible for Safari to create this file in other locations. "Although the filename and location of the downloaded file content cannot be directly specified by remote servers, this may still lead to downloading content into locations accessible to other users."
The Mac OS X update also addresses a serious error in the handling of HTTP headers in the Apache 2 Web server. This bug can be exploited by malicious people to conduct HTTP-request smuggling attacks when Apache is used in conjunction with certain proxy servers, caching servers or Web application firewalls.
Read details here about earlier browser security issues in Internet Explorer, Firefox and Safari.
Also fixed is an error in the Apache Web servers "modest" module that can be exploited to bypass certain security restrictions.
Other components fixed in the update are Core Foundation, CoreTypes, curl, iodbcadmin, OpenSSL, sudo and syslog.
Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.