![]() ![]() ![]() This issue does not affect the default configuration as mod_perl and its status page are not enabled by default. An attacker may leverage this issue to inject arbitrary script code in the context of a web site served by Apache. This issue is addressed through improved signaling of error conditions.Ī cross-site scripting issue exists in Apache mod_perl’s encoding of HTML output for the /perl-status page. This may allow a remote attacker to determine the existence of an AFP share with a given name. This issue is addressed through improved path validation.Īn error handling issue exists in AFP Server. With a system configuration where users are permitted file sharing access only, this may lead to arbitrary code execution. This issue is addressed through improved validation of reconnect packets.Ī directory traversal issue exists in AFP Server, which may allow an authenticated user to create files outside of a share with the permissions of the user. Mac OS X automatically restarts AFP Server after a shutdown. ![]() A remote attacker may cause AFP Server to unexpectedly shutdown. Apple released Mac OS X 10.6.5 and Security Update 2010-007 which increases the stability, compatibility, and security of your Mac.Ī null pointer dereference exists in AFP Server’s handling of reconnect authentication packets. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |