===================================================================== CERT-Renater Note d'Information No. 2013/VULN471 _____________________________________________________________________ DATE : 23/10/2013 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running OS X Server versions prior to 3.0. ====================================================================== http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html ______________________________________________________________________ APPLE-SA-2013-10-22-5 OS X Server 3.0 OS X Server 3.0 is now available and addresses the following: Profile Manager Available for: OS X Mavericks v10.9 or later Impact: A remote attacker may be able to cause a denial of service Description: The JSON Ruby Gem permanently allocated memory when parsing certain constructs in its input. An attacker could exploit this to use all available memory leading to a denial of service. This issue was addressed through additional validation of JSON data. CVE-ID CVE-2013-0269 Profile Manager Available for: OS X Mountain Lion v10.9 or later Impact: Multiple issues in Ruby on Rails Description: Multiple issues existed in Ruby on Rails, the most serious of which may lead to cross site scripting. These issues were addressed by updating the Rails implementation used by Profile Manager to version 2.3.18. CVE-ID CVE-2013-1854 CVE-2013-1855 CVE-2013-1856 CVE-2013-1857 FreeRADIUS Available for: OS X Mavericks v10.9 or later Impact: A remote attacker may be able to cause a denial of service or arbitrary code execution Description: A buffer overflow existed in FreeRADIUS when parsing the 'not after' timestamp in a client certificate, when using TLS- based EAP methods. This issue was addressed by updating FreeRADIUS to version 2.2.0. CVE-ID CVE-2012-3547 Server App Available for: OS X Mavericks v10.9 or later Impact: Server may use a fallback certificate during authentication Description: A logic issue existed whereby the RADIUS service could choose an incorrect certificate from the list of configured certificates. The issue was addressed by using the same certificate as other services. CVE-ID CVE-2013-5143 : Arek Dreyer of Dreyer Network Consultants, Inc. OS X Server 3.0 may be obtained from Mac App Store. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ ========================================================= Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================