Apple on Monday released Security Update 2004-09-30, which fixes two AFP Server and CUPS issues as well as problems with NetInfoManager, postfix and the ServerAdmin component in Mac OS X Server v10.2.8 and v10.3.5. In addition, a QuickTime heap buffer overflow problem that could allow someone to execute code hidden in a BMP has been repaired. The CUPS and QuickTime fixes apply to Mac OS X v10.3.5 and v10.2.8 as well as the Server versions of each while the others apply only to the user and Server editions of v10.3.5.
You can download this update via the Software Update system preference or from
Apple’s Web site.
is available on the Apple Web site and has been listed below.
Description: An AFP volume mounted by a guest could be used to terminate authenticated user mounts from the same server by modifying SessionDestroy packets. This issue does not affect systems prior to Mac OS X v10.3 or Mac OS X Server v10.3.
Description: A write-only Drop Box on an AFP volume mounted by a guest could sometimes be read-write due to an incorrect setting of the guest group id. This issue does not affect systems prior to Mac OS X v10.3 or Mac OS X Server v10.3.
Description: The Internet Printing Protocol (IPP) implementation in CUPS can hang when a certain UDP packet is sent to the IPP port.
Description: Certain methods of authenticated remote printing could disclose user passwords in the printing system log files. Credit to Gary Smith of the IT Services department at Glasgow Caledonian University for reporting this issue.
Description: The NetInfo Manager utility can enable the “root” account, but after a single “root” login it is no longer possible to use NetInfo Manager to disable the account and it incorrectly appears to be disabled. This issue does not affect systems prior to Mac OS X v10.3 or Mac OS X Server v10.3.
Description: When SMTPD AUTH has been enabled in postfix, a buffer containing the username is not correctly cleared between authentication attempts. Only users with the longest usernames will be able to authenticate. This issue does not affect systems prior to Mac OS X v10.3 or Mac OS X Server v10.3. Credit to Michael Rondinelli of EyeSee360 for reporting this issue.
Description: Flaws in decoding the BMP image type could overwrite heap memory and potentially allow the execution of arbitrary code hidden in an image.
Description: Client – Server communication with ServerAdmin uses SSL. All systems come installed with the same example self signed certificate. If that certificate has not been replaced, then ServerAdmin communication may be decrypted. The fix replaces the existing self-signed certificate with one that has been locally and uniquely generated.