--- begin forwarded text

Status: RO
Delivered-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
From: Fearghas McKay <[EMAIL PROTECTED]>
Subject: [Mac_crypto] "Security Update 2002-08-02 for OpenSSL, Sun RPC,
mod_ssl" does
 not verify
Sender: [EMAIL PROTECTED]
Date: Sat, 3 Aug 2002 08:38:50 +0100

**A verification of this security announcement mail fails**

The key is signed by Vinnie Moscaritolo - [EMAIL PROTECTED] which is a good
thing even if Vinnie is no longer at Apple ( which is a bad thing ), it is
also signed by someone who does not appear on any of the public keyservers
that I can find which is a bit disappointing.

Verified version is at the bottom.

        f

--- begin forwarded text


Subject: Security Update 2002-08-02 for OpenSSL, Sun RPC, mod_ssl
From: Product Security <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
X-BeenThere: [EMAIL PROTECTED]
X-Mailman-Version: 2.0.8
List-Unsubscribe:
<http://www.lists.apple.com/mailman/listinfo/security-announce>,
        <mailto:[EMAIL PROTECTED]?subject=unsubscribe>
List-Id: Product security notifications and announcements from Apple
<security-announce.lists.apple.com>
List-Post: <mailto:[EMAIL PROTECTED]>
List-Help: <mailto:[EMAIL PROTECTED]?subject=help>
List-Subscribe:
<http://www.lists.apple.com/mailman/listinfo/security-announce>,
        <mailto:[EMAIL PROTECTED]?subject=subscribe>
List-Archive: <http://www.lists.apple.com/archives/security-announce/>
Date: Fri, 2 Aug 2002 15:45:34 -0700

-----BEGIN PGP SIGNED MESSAGE-----

Security Update 2002-08-02 is now available.  It contains fixes for
recent
vulnerabilities in:

    OpenSSL:  Fixes security vulnerabilities CAN-2002-0656,
CAN-2002-0657,
       CAN-2002-0655, and CAN-2002-0659.  Details are available via:
       http://www.cert.org/advisories/CA-2002-23.html

    mod_ssl:  Fixes CAN-2002-0653, an off-by-one buffer overflow in the
       mod_ssl Apache module.  Details are available via:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0653

    Sun RPC:  Fixes CAN-2002-039, a buffer overflow in the Sun RPC XDR
decoder.
       Details are available via:

http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823

Affected systems:  Mac OS X client and Mac OS X Server

Note:  Mac OS X client is configured by default to have these services
turned
off, and is only vulnerable if the user has enabled network services
which rely
on the affected components.  It is still recommended for Mac OS X
client users
to apply this security update to their system.

System requirements:  Mac OS X 10.1.5

Security Update 2002-08-02 may be obtained from:

   * Software Update pane in System Preferences

   * Apple's Software Downloads web site:
       http://docs.info.apple.com/article.html?artnum=120139

       SSL server:
       https://depot.info.apple.com/security/129403bc5e184e3b7367.html

To help verify the integrity of Security Update 2002-08-02 from the
Software Downloads web site:

    The download file is titled:  SecurityUpd2002-08-02.dmg
    Its SHA-1 digest is:  54f6eebe0398181db8f1129403bc5e184e3b7367

Information will also be posted to the Apple Product Security web site:
http://www.apple.com/support/security/security_updates.html

This message is signed with Apple's Product Security PGP key, and
details are available at:
http://www.apple.com/support/security/security_pgp.html

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.3

iQEVAwUBPUsLOiFlYNdE6F9oAQGAigf+JV+lazuko1g4oZSNFTd2puXCtOGQ0M8c
2cZ/BdaEBA8jLGrPkhWuvmMwpN9z6G9chnN8s9EXiavcBG5e/ejtTo3ZHoOGP7bg
789zLQLK2JTB75nc0fNyx2CdfHlEIM00v8c2jXySLlnqF+kzwqVnjUL7i2O97Fk5
tWXLc2dWK2Nf2SUk0/yLgfjceZKEPCPXTpuKYuah/w9NwzL+LsbPcfXA/H1f4ngc
vRPc2sn2HYu9IJw/BrMEsDlS8IWHf6ozXdZ9qaVCVRrZlsd9gSSmB2Jba4be/MRX
FauTTepMF9+JfCkx+2wtpwWhBcXoJnjwIZXOXwbbRjqXHmzzgu8D/Q==
=fdGO
-----END PGP SIGNATURE-----
_______________________________________________
security-announce mailing list | [EMAIL PROTECTED]
Help/Unsubscribe/Archives:
http://www.lists.apple.com/mailman/listinfo/security-announce
Do not post admin requests to the list. They will be ignored.

--- end forwarded text

Verified version with verification failure

---

Subject: Security Update 2002-08-02 for OpenSSL, Sun RPC, mod_ssl
From: Product Security <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
X-BeenThere: [EMAIL PROTECTED]
X-Mailman-Version: 2.0.8
List-Unsubscribe:
<http://www.lists.apple.com/mailman/listinfo/security-announce>,
        <mailto:[EMAIL PROTECTED]?subject=unsubscribe>
List-Id: Product security notifications and announcements from Apple
<security-announce.lists.apple.com>
List-Post: <mailto:[EMAIL PROTECTED]>
List-Help: <mailto:[EMAIL PROTECTED]?subject=help>
List-Subscribe:
<http://www.lists.apple.com/mailman/listinfo/security-announce>,
        <mailto:[EMAIL PROTECTED]?subject=subscribe>
List-Archive: <http://www.lists.apple.com/archives/security-announce/>
Date: Fri, 2 Aug 2002 15:45:34 -0700

*** PGP SIGNATURE VERIFICATION ***
*** Status:   Bad Signature
*** Alert:    Signature did not verify. Message has been altered.
*** Signer:   Apple Product Security <[EMAIL PROTECTED]> (0x44E85F68)
*** Signed:   08/02/2002 11:44:10 PM
*** Verified: 08/03/2002 08:34:01 AM
*** BEGIN PGP VERIFIED MESSAGE ***
Security Update 2002-08-02 is now available.  It contains fixes for
recent
vulnerabilities in:

    OpenSSL:  Fixes security vulnerabilities CAN-2002-0656,
CAN-2002-0657,
       CAN-2002-0655, and CAN-2002-0659.  Details are available via:
       http://www.cert.org/advisories/CA-2002-23.html

    mod_ssl:  Fixes CAN-2002-0653, an off-by-one buffer overflow in the
       mod_ssl Apache module.  Details are available via:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0653

    Sun RPC:  Fixes CAN-2002-039, a buffer overflow in the Sun RPC XDR
decoder.
       Details are available via:

http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823

Affected systems:  Mac OS X client and Mac OS X Server

Note:  Mac OS X client is configured by default to have these services
turned
off, and is only vulnerable if the user has enabled network services
which rely
on the affected components.  It is still recommended for Mac OS X
client users
to apply this security update to their system.

System requirements:  Mac OS X 10.1.5

Security Update 2002-08-02 may be obtained from:

   * Software Update pane in System Preferences

   * Apple's Software Downloads web site:
       http://docs.info.apple.com/article.html?artnum=120139

       SSL server:
       https://depot.info.apple.com/security/129403bc5e184e3b7367.html

To help verify the integrity of Security Update 2002-08-02 from the
Software Downloads web site:

    The download file is titled:  SecurityUpd2002-08-02.dmg
    Its SHA-1 digest is:  54f6eebe0398181db8f1129403bc5e184e3b7367

Information will also be posted to the Apple Product Security web site:
http://www.apple.com/support/security/security_updates.html

This message is signed with Apple's Product Security PGP key, and
details are available at:
http://www.apple.com/support/security/security_pgp.html
*** END PGP VERIFIED MESSAGE ***
_______________________________________________
security-announce mailing list | [EMAIL PROTECTED]
Help/Unsubscribe/Archives:
http://www.lists.apple.com/mailman/listinfo/security-announce
Do not post admin requests to the list. They will be ignored.

---
_______________________________________________
mac_crypto mailing list
[EMAIL PROTECTED]
http://www.vmeng.com/mailman/listinfo/mac_crypto

--- end forwarded text


-- 
-----------------
R. A. Hettinga <mailto: [EMAIL PROTECTED]>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

Reply via email to