lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <8215C056-E75F-491D-857F-D8299DEB46B8@lists.apple.com>
Date: Thu, 10 Nov 2011 16:55:51 -0800
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: APPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n)
 Firmware 7.6

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n)
Firmware 7.6

Time Capsule and AirPort Base Station (802.11n) Firmware 7.6 is now
available and addresses the following:

Available for:  AirPort Extreme Base Station with 802.11n,
AirPort Express Base Station with 802.11n, Time Capsule
Impact:  An attacker in a privileged network position may be able to
cause arbitrary command execution via malicious DHCP responses
Description:  dhclient allowed remote attackers to execute arbitrary
commands via shell metacharacters in a hostname obtained from a DHCP
message. This issue is addressed by stripping shell meta-characters
in dhclient-script.
CVE-ID
CVE-2011-0997 : Sebastian Krahmer and Marius Tomaschewski of the SUSE
Security Team working with ISC


Installation note for Firmware version 7.6

Firmware version 7.6 is installed into Time Capsule or AirPort Base
Station with 802.11n via AirPort Utility, provided with the device.

It is recommended that AirPort Utility 5.5.3 or later be installed
before upgrading to Firmware version 7.6.

AirPort Utility 5.5.3 or later may be obtained through Apple's
Software Download site: http://www.apple.com/support/downloads/

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.16 (Darwin)

iQEcBAEBAgAGBQJOusONAAoJEGnF2JsdZQeerVcH/iuka+0teMpSn6bPJTzMuqy2
ea0cB1CwysYQwasw7sR1tAlUmhy1P8JPdLh8yTsb052JaRRbJ2deh3IlJealW/3q
HQgnp20rIwCPVu5m2BUWz02NIJYBHrmpl27/mNYPItQhm4ql6ma+8oBiBvzz7LGW
5/1urVr3R3rtFO+AGNnULbPNOkFfLR9+iHe0XOUEVSaKGIOF4XnZ8t/9c+/Odf/d
y3HerbAEY54ZG6IpUMvErr73IZD1bQGxqUEbclUmqxM/H0wydJrlqRgKT34rkQut
3o/yoPP+qKb0EJNQ8b0lKasIFW//aAT4ArKOlb5WW/NXeatvvhyUeO2GfZqpk5U=
=HQYl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ