Saw this a few days ago, but didn't remember to post it until Craig posted his interesting virus thread...
8-10-04 - Today, Apple released OS X 10.3.5 fixing three problems with previous versions of the operating system. Among these is the patch for the libpng buffer overflow we mentioned in our Vulnerability Alert last week. By enticing one of your users into viewing a specially-crafted PNG image, an attacker could exploit one of six flaws in libpng to either crash the user's application or execute code with that user's permissions. The patch fixes these vulnerabilities. We recommend that OS X administrators download, test, and install Apple's patch.
http://docs.info.apple.com/article.html?artnum=61798
http://www.apple.com/support/downloads/
Mac OS X 10.3.5
libpng (Portable Network Graphics) Fixes CAN-2002-1363, CAN-2004-0421, CAN-2004-0597, CAN-2004-0598, CAN-2004-0599
Impact: Malicious PNG images can cause application crashes and could execute arbitrary code
Description: A number of buffer overflows, null pointer dereferences and integer overflows have been discovered in the reference library for reading and writing PNG images. These vulnerabilities have been corrected in libpng which is used by the CoreGraphics and AppKit frameworks in Mac OS X. After installing this update, applications that use the PNG image format via these frameworks will be protected against these flaws.
Safari: Fixes CAN-2004-0743
Impact: In a special situation, navigation using the forward/backward buttons can re-send form data to a GET url.
Description: This is for a situation where a web form is sent to a server using a POST method which issues an HTTP redirect to a GET method url. Using the forward/backward buttons will cause Safari to re-POST the form data to the GET url. Safari has been modified so that in this situation forward/backward navigation will result in only a GET method. Credit to Rick Osterberg of Harvard University FAS Computer Services for reporting this issue.
TCP/IP Networking: Fixes CAN-2004-0744
Impact: Maliciously crafted IP fragments can use too many system resources preventing normal network operation.
Description: The "Rose Attack" describes a specially constructed sequence of IP fragments designed to consume system resources. The TCP/IP implementation has been modified to limit the resources consumed and prevents this denial of service attack. Credit to Ken Hollis (gandalf@digital.net) and Chuck McAuley (chuck-at-lemure-dot-net), from a discussion about the "Rose Attack."