[<prev] [next>] [day] [month] [year] [list]
Message-ID: <48A202BE0432ED4494777E759C48F06E10F873@SVL1XCHCLUPIN01.enterprise.veritas.com>
Date: Thu, 5 Jan 2006 14:39:42 -0800
From: <noreply@...urityfocus.com>
To: <bugtraq@...urityfocus.com>
Subject: APPLE-SA-2006-01-05 AirPort firmware update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2006-01-05 AirPort firmware update
The following AirPort firmware updates are available:
AirPort Express Firmware Update 6.3 for Mac OS X
AirPort Express Firmware Update 6.3 for Windows
AirPort Extreme Firmware Update 5.7 for Mac OS X
AirPort Extreme Firmware Update 5.7 for Windows
They each provide a security enhancement for the following issue:
CVE-ID: CVE-2005-3714
Impact: AirPort network interface becomes unresponsive
Description: A malicious network attacker that can generate specially
crafted packets may be able to cause an AirPort base station's
network interface to stop responding normally, resulting in a
denial-of-service. This update addresses the issue by discarding
the malformed packets. Credit to Michael Zanetta of NETwork Security
Consortium for reporting this issue.
The AirPort updates may be obtained from the Software Update
pane in System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
AirPort Express Firmware Update 6.3 for Mac OS X
The download file is named: "AirPortExpressFWUpdater.dmg"
Its SHA-1 digest is: 2d6a7c7b35e84fda44e52a7b994ed31a2f8e25d7
AirPort Express Firmware Update 6.3 for Windows
The download file is named: "AirPortExpressFWUpdater.exe"
Its SHA-1 digest is: d8ff8310ef19b5fc4f022091742578ca2cd664d6
AirPort Extreme Firmware Update 5.7 for Mac OS X
The download file is named: "AirPortExtremeFWUpdater.dmg"
Its SHA-1 digest is: 06f0e12b95f27b020e45f616317f8d9e97ca4f76
AirPort Extreme Firmware Update 5.7 for Windows
The download file is named: "AirPortExtremeFWUpdater.exe"
Its SHA-1 digest is: 05b39317a1388b85569e9be1333f85a0019edb39
Information will also be posted to the Apple Product Security
web site:
http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.4 (Build 4042)
iQEVAwUBQ72Md4HaV5ucd/HdAQJYhQf9G0sVnQrLwepjS4js0ot5+JXSIYkBlGL9
1rGSJPzmf9azJ+mQVHwyd/+kiw41BeNu6rGDQH5DQKuWtUYDhSfanB09tRWKkJYf
9zABTZkctVU3uSXsdpRDkMnkxoU1z21SDMnsTtpoElEEskWTRcIwJGcByep6zkwu
tD1b3ngeOvIjcuRZmr+186ISffOVcJZNkHgbBONULSQAKfFX0Xc9USaPtIgEErCY
++cOysldQBjObEQazn7zwvBqwCcAQCfqCV6LL+Bb4wX3ZmFuNFhWEel9alsnNMPq
upD+P5k3pQ0+z+PcvySDGfcmBJYBWsi5GLJg5nAIKUWJt97OXLK8Mg==
=6PGu
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists