Jump to content


Photo

Apple Mac OS X updates


  • Please log in to reply
149 replies to this topic

#101 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 13 September 2012 - 09:01 AM

FYI...

Apple iTunes v10.7 released
- https://secunia.com/advisories/50618/
Release Date: 2012-09-13
Criticality level: Highly critical
Impact: System access
Where: From remote
... vulnerabilities are reported in versions prior to 10.7.
Solution: Update to version 10.7.
Original Advisory: APPLE-SA-2012-09-12-1:
http://lists.apple.c...p/msg00001.html

- http://www.securityt....com/id/1027525
CVE Reference: CVE-2012-2817, CVE-2012-2818, CVE-2012-2829, CVE-2012-2831, CVE-2012-3601, CVE-2012-3602, CVE-2012-3606, CVE-2012-3607, CVE-2012-3612, CVE-2012-3613, CVE-2012-3614, CVE-2012-3616, CVE-2012-3617, CVE-2012-3621, CVE-2012-3622, CVE-2012-3623, CVE-2012-3624, CVE-2012-3632, CVE-2012-3643, CVE-2012-3647, CVE-2012-3648, CVE-2012-3649, CVE-2012-3651, CVE-2012-3652, CVE-2012-3654, CVE-2012-3657, CVE-2012-3658, CVE-2012-3659, CVE-2012-3660, CVE-2012-3671, CVE-2012-3672, CVE-2012-3673, CVE-2012-3675, CVE-2012-3676, CVE-2012-3677, CVE-2012-3684, CVE-2012-3685, CVE-2012-3687, CVE-2012-3688, CVE-2012-3692, CVE-2012-3699, CVE-2012-3700, CVE-2012-3701, CVE-2012-3702, CVE-2012-3703, CVE-2012-3704, CVE-2012-3705, CVE-2012-3706, CVE-2012-3707, CVE-2012-3708, CVE-2012-3709, CVE-2012-3710, CVE-2012-3711, CVE-2012-3712
Sep 13 2012
Impact: Execution of arbitrary code via network, User access via network
Version(s): prior to 10.7

- https://support.apple.com/kb/HT5485
Sep 12, 2012
___

163 security holes in iTunes
- http://h-online.com/-1706849
13 Sep 2012

:!: :ph34r:

Edited by AplusWebMaster, 13 September 2012 - 09:58 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#102 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 18 September 2012 - 01:05 PM

FYI...

Apple Remote Desktop 3.5.3 released
- http://lists.apple.c...p/msg00002.html
17 Sep 2012 - "... Apple Remote Desktop 3.0 or later
Impact: Connecting to a third-party VNC server with "Encrypt all network data" set may lead to information disclosure..."

Apple Remote Desktop 3.5.3 may be obtained from the Software Update pane in System Preferences,
or Apple's Software Downloads web site:
- http://www.apple.com...port/downloads/

- https://support.apple.com/kb/HT5462
17 Sep 2012
Apple Remote Desktop 3.5.3
CVE-2012-0681

:!: :ph34r:
This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#103 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 19 September 2012 - 04:42 PM

FYI...

iOS 6 released
APPLE-SA-2012-09-19-1 iOS 6
- http://lists.apple.c...p/msg00003.html
19 Sep 2012
"iOS 6 is now available...
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later..."

- https://support.apple.com/kb/HT5503
"... can be downloaded and installed using iTunes*..."
* https://support.apple.com/kb/ht1414

- https://secunia.com/advisories/50586/
Release Date: 2012-09-20
Criticality level: Highly critical
Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of system information, Exposure of sensitive information, Privilege escalation, System access
Where: From remote ...
Solution: Upgrade to iOS 6 via Software Update.

- http://www.securityt....com/id/1027552
CVE Reference: CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-4599, CVE-2012-3724, CVE-2012-3725, CVE-2012-3726, CVE-2012-3727, CVE-2012-3728, CVE-2012-3729, CVE-2012-3730, CVE-2012-3731, CVE-2012-3732, CVE-2012-3733, CVE-2012-3734, CVE-2012-3735, CVE-2012-3736, CVE-2012-3737, CVE-2012-3738, CVE-2012-3739, CVE-2012-3740, CVE-2012-3741, CVE-2012-3742, CVE-2012-3743, CVE-2012-3744, CVE-2012-3745, CVE-2012-3746, CVE-2012-3747
Sep 20 2012
Impact: Disclosure of system information, Execution of arbitrary code via local system, Execution of arbitrary code via network, Root access via local system, User access via local system, User access via network...
Solution: The vendor has issued a fix (6.0).
___

- http://h-online.com/-1713012
20 Sep 2012

- https://isc.sans.edu...l?storyid=14128
"iOS6 released: a few CVEs addresses, breaks mapping."

:!:

Edited by AplusWebMaster, 20 September 2012 - 08:30 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#104 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 20 September 2012 - 07:47 AM

FYI...

Apple security updates
- https://support.apple.com/kb/HT1222
3x - 19 Sept 2012
___

Safari v6.0.1 for Mac OS X
- https://secunia.com/advisories/50577/
Release Date: 2012-09-20
Criticality level: Highly critical
Impact: Security Bypass, Exposure of sensitive information, System access
Where: From remote...
Solution: Update to version 6.0.1...
Original Advisory: Apple:
http://support.apple.com/kb/HT5502

> http://lists.apple.c...p/msg00005.html
APPLE-SA-2012-09-19-3 Safari 6.0.1
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 and v10.8.1

- http://www.securityt....com/id/1027550
CVE Reference: CVE-2012-3713, CVE-2012-3714, CVE-2012-3715, CVE-2012-3598
Date: Sep 20 2012
Impact: Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Version(s): prior to 6.0.1
___

Mac OS X multiple vulns - Security Update 2012-004
- https://secunia.com/advisories/50628/
Release Date: 2012-09-20
Criticality level: Highly critical
Impact: Security Bypass, Exposure of sensitive information, Privilege escalation, DoS, System access
Where: From remote...
Solution: Update to version 10.8.2 or 10.7.5 or apply Security Update 2012-004.

- http://lists.apple.c...p/msg00004.html
APPLE-SA-2012-09-19-2 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004

- http://www.securityt....com/id/1027551
CVE Reference: CVE-2012-0650, CVE-2012-3716, CVE-2012-3718, CVE-2012-3719, CVE-2012-3720, CVE-2012-3721, CVE-2012-3722, CVE-2012-3723
Sep 20 2012
Impact: Denial of service via network, Disclosure of authentication information, Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
... vendor's advisory is available at:
http://support.apple.com/kb/HT5501

:!: :!:

Edited by AplusWebMaster, 20 September 2012 - 08:57 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#105 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 25 September 2012 - 10:54 AM

FYI...

Apple TV v5.1 released
- https://secunia.com/advisories/50728/
Release Date: 2012-09-25
Criticality level: Highly critical
Impact: Exposure of sensitive information, DoS, System access
Where: From remote
CVE Reference(s): CVE-2011-1167, CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3026, CVE-2011-3048, CVE-2011-3328, CVE-2011-3919, CVE-2012-0682, CVE-2012-0683, CVE-2012-1173, CVE-2012-3589, CVE-2012-3590, CVE-2012-3591, CVE-2012-3592, CVE-2012-3678, CVE-2012-3679, CVE-2012-3722, CVE-2012-3725, CVE-2012-3726
... vulnerabilities are reported in versions prior to 5.1.
Solution: Update to Apple TV Software version 5.1.
Original Advisory: APPLE-SA-2012-09-24-1:
http://support.apple.com/kb/HT5504
Apple TV 2nd generation and later

- https://support.apple.com/kb/HT4448
Apple TV (2nd and 3rd generation) software updates
Sep 24, 2012

How to update: https://support.apple.com/kb/HT1600

APPLE-SA-2012-09-24-1 Apple TV 5.1
- http://lists.apple.c...p/msg00006.html
24 Sep 2012

:!:

Edited by AplusWebMaster, 25 September 2012 - 12:18 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#106 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 28 September 2012 - 10:21 AM

FYI...

RE: iOS 6 release / Apple maps...

- http://news.yahoo.co...-135819039.html
Sep 28, 2012 - "Apple CEO Tim Cook says the company is "extremely sorry" for the frustration that its maps application has caused and it's doing everything it can to make it better. Cook said in a letter posted online Friday that Apple "fell short" in its commitment to make the best possible products for its customers. He recommends that people try alternatives by downloading competing map apps from the App Store while Apple works on its own maps products.... 'had released an update to its iPhone and iPad operating system last week that replaced Google Maps with Apple's own maps application. But users complained that the new maps have fewer details, lack public transit directions and misplace landmarks, among other problems."
* https://www.apple.co...m-cook-on-maps/
Sep 28, 2012

:(
This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#107 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 04 October 2012 - 06:41 AM

FYI...

Apple OS X Svr v2.1.1 released
- https://secunia.com/advisories/50859/
Release Date: 2012-10-04
Criticality level: Moderately critical
Impact: Security Bypass, Exposure of sensitive information, System access
Where: From remote
Software: Apple OS X Server 2.x
CVE Reference(s): CVE-2012-3488, CVE-2012-3489, CVE-2012-3525
... vulnerabilities are reported in versions prior to 2.1.1.
Solution: Update to version 2.1.1.
Original Advisory: APPLE-SA-2012-09-19-4:
http://prod.lists.ap...t/msg00000.html
APPLE-SA-2012-09-19-4 OS X Server v2.1.1

- https://support.apple.com/kb/HT5533
Oct 03, 2012

- http://web.nvd.nist....d=CVE-2012-3525 - 5.8
- http://web.nvd.nist....d=CVE-2012-3488 - 5.8
- http://web.nvd.nist....d=CVE-2012-3489 - 5.o

:!: :ph34r:

Edited by AplusWebMaster, 04 October 2012 - 06:39 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#108 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 17 October 2012 - 04:51 PM

FYI...

Apple Java for OS X 2012-006 / Mac OS X 10.6 Update 11
- https://support.apple.com/kb/HT5549
Oct 17, 2012 - "Multiple vulnerabilities exist in Java 1.6.0_35... addressed by updating to Java version 1.6.0_37..."
- http://lists.apple.c...t/msg00001.html

- https://support.apple.com/kb/DL1572
"Java for OS X 2012-006 delivers improved security, reliability, and compatibility by updating Java SE 6 to 1.6.0_37. This update uninstalls the Apple-provided Java applet plug-in from all web browsers. To use applets on a web page, click on the region labeled "Missing plug-in" to go download the latest version of the Java applet plug-in from Oracle. Please quit any web browsers and Java applications before installing this update..."

- https://secunia.com/advisories/50942/
Release Date: 2012-10-17
Criticality level: Highly critical
Impact: Manipulation of data, Exposure of sensitive information, DoS, System access
Where: From remote
... more information: https://secunia.com/SA50949/
Solution: Apply updates.
Original Advisory: http://support.apple.com/kb/HT5549

- https://support.apple.com/kb/HT5493

- http://support.apple.com/kb/HT1222
___

> http://regmedia.co.u...java_update.jpg

- http://h-online.com/-1732089
18 Oct 2012

:!:

Edited by AplusWebMaster, 21 October 2012 - 06:39 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#109 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 01 November 2012 - 07:40 PM

FYI...

iOS 6.0.1 Software Update
- https://support.apple.com/kb/DL1606
Nov 1, 2012
"This update contains improvements and bug fixes, including:
• Fixes a bug that prevents iPhone 5 from installing software updates wirelessly over the air
• Fixes a bug where horizontal lines may be displayed across the keyboard
• Fixes an issue that could cause camera flash to not go off
• Improves reliability of iPhone 5 and iPod touch (5th generation) when connected to encrypted WPA2 Wi-Fi networks
• Resolves an issue that prevents iPhone from using the cellular network in some instances
• Consolidated the Use Cellular Data switch for iTunes Match
• Fixes a Passcode Lock bug which sometimes allowed access to Passbook pass details from lock screen
• Fixes a bug affecting Exchange meetings
For information on the security content of this update, please visit this website:
http://support.apple.com/kb/HT1222
This update is available via iTunes and wirelessly."

- https://secunia.com/advisories/51162/
Release Date: 2012-11-02
Criticality level: Highly critical
Impact: Security Bypass, Exposure of system information, System access
Where: From remote
CVE Reference(s): CVE-2012-3748, CVE-2012-3749, CVE-2012-3750, CVE-2012-5112
For more information: https://secunia.com/SA51157/
Solution: Apply iOS 6.0.1 Software Update.
Original Advisory: APPLE-SA-2012-11-01-1:
http://support.apple.com/kb/HT5567
> http://lists.apple.c...v/msg00000.html
___

Safari 6.0.2 released
- https://support.apple.com/kb/HT5568
Nov 1, 2012
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.2
... WebKit -
1) Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A time of check to time of use issue existed in the handling of JavaScript arrays. This issue was addressed through additional validation of JavaScript arrays.
CVE-2012-3748 : Joost Pol and Daan Keuper of Certified Secure working with HP TippingPoint's Zero Day Initiative
2) Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A use after free issue existed in the handling of SVG images. This issue was addressed through improved memory handling.
CVE-2012-5112 : Pinkie Pie working with Google's Pwnium 2 contest...

- https://secunia.com/advisories/51157/
Release Date: 2012-11-02
Criticality level: Highly critical
Impact: System access
Where: From remote
CVE Reference(s): CVE-2012-3748, CVE-2012-5112
For more information: https://secunia.com/SA50954/
The vulnerabilities are reported in versions prior to 6.0.2 running on OS X Lion and OS X Mountain Lion.
Solution: Update to version 6.0.2.
Original Advisory: APPLE-SA-2012-11-01-2:
http://support.apple.com/kb/HT5568
> http://lists.apple.c...v/msg00001.html

:!: :!:

Edited by AplusWebMaster, 02 November 2012 - 07:56 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#110 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 08 November 2012 - 08:11 AM

FYI...

QuickTime v7.7.3 released
- https://secunia.com/advisories/51226/
Release Date: 2012-11-08
Criticality level: Highly critical
Impact: System access
Where: From remote
CVE Reference(s): CVE-2011-1374, CVE-2012-3751, CVE-2012-3752, CVE-2012-3753, CVE-2012-3754, CVE-2012-3755, CVE-2012-3756, CVE-2012-3757, CVE-2012-3758
... vulnerabilities are reported in versions prior to 7.7.3.
Solution: Update to version 7.7.3.
Original Advisory: http://support.apple.com/kb/HT5581

> http://lists.apple.c...v/msg00002.html
... QuickTime 7.7.3 may be obtained from the QuickTime Downloads site:
http://www.apple.com...ktime/download/
-or-
Use Apple Software Update.
___

- http://h-online.com/-1746273
8 Nov 2012

:!: :ph34r:

Edited by AplusWebMaster, 08 November 2012 - 08:38 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#111 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 15 December 2012 - 06:44 AM

FYI...

iTunes 11.0.1 released
- https://support.apple.com/kb/DL1614
Dec 13, 2012 - "This update to the new iTunes addresses an issue where new purchases in iCloud may not appear in your library if iTunes Match is turned on, makes iTunes more responsive when searching a large library, fixes a problem where the AirPlay button may not appear as expected, and adds the ability to display duplicate items within your library. This update also includes other important stability and performance improvements."

Available on Apple Software Update.

:ph34r:
This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#112 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 18 December 2012 - 05:28 PM

FYI...

iOS 6.0.2 Software Update
- http://support.apple.com/kb/DL1621
Dec 18, 2012 - Fixes a bug that could impact Wi-Fi...
System Requirements: iPhone 5, iPad mini

- http://www.todaysiph...eased-by-apple/
"... everyone and their dogs are trying to download the delta update and Apple’s servers are having a hard time..."

- http://bgr.com/2012/...2258170-258170/
Dec 18, 2012 - "... these Wi-Fi issues were supposed to be fixed with the release of iOS 6.0.1 but notes that users have still reported problems connecting to known Wi-Fi hotspots even after installing the patch..."

:!: :!:

Edited by AplusWebMaster, 18 December 2012 - 05:33 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#113 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 28 January 2013 - 07:33 PM

FYI...

Apple iOS 6.1 Software Update
- https://support.apple.com/kb/HT5642
28 Jan 2013
- http://www.securityt....com/id/1028051
CVE Reference: CVE-2012-2619, CVE-2012-2824, CVE-2012-2857, CVE-2012-2889, CVE-2013-0948, CVE-2013-0949, CVE-2013-0950, CVE-2013-0951, CVE-2013-0952, CVE-2013-0953, CVE-2013-0954, CVE-2013-0955, CVE-2013-0956, CVE-2013-0958, CVE-2013-0959, CVE-2013-0962, CVE-2013-0964, CVE-2013-0968, CVE-2013-0974
Jan 29 2013
Impact: Denial of service via network, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 6.1
___

- http://h-online.com/-1793259
29 Jan 2013
___

Apple TV 5.2
- https://support.apple.com/kb/HT5643
28 Jan 2013
- http://www.securityt....com/id/1028050
CVE Reference: CVE-2012-2619, CVE-2013-0964
Jan 29 2013
Impact: Denial of service via network, Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2nd generation and later; firmware prior to 5.2

:ph34r: :ph34r:


Edited by AplusWebMaster, 29 January 2013 - 10:26 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#114 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 05 February 2013 - 08:39 AM

FYI...

Apple OS X Server v2.2.1 released
Mac OS X v10.6 Update 12
- https://support.apple.com/kb/HT5644

- http://prod.lists.ap...b/msg00001.html
4 Feb 2013

Available for: OS X Mountain Lion v10.8 or later
CVE-IDs:
- https://web.nvd.nist...d=CVE-2013-0156 - 7.5 (HIGH)
- https://web.nvd.nist...d=CVE-2013-0333 - 7.5 (HIGH)

- https://support.apple.com/kb/HT1338

- http://www.apple.com...port/downloads/
___

- https://secunia.com/advisories/52095/
Release Date: 2013-02-05
Criticality level: Highly critical
Impact: System access
Where: From remote
CVE Reference(s): CVE-2013-0156, CVE-2013-0333
... vulnerabilities are reported in versions prior to 2.2.1.
Solution: Update to version 2.2.1.
 

:ph34r: :ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#115 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 09 February 2013 - 10:55 AM

FYI...

Expect a v2 of iOS 6.1 ...


iOS 6.1 Leads to Battery Life Drain, Overheating for iPhone Users
- http://thenextweb.co...ing-to-ios-6-1/
8 Feb 2013

- http://arstechnica.c...ontacts-photos/
Feb 14, 2013 - "An -old- vulnerability in the iPhone's lock screen and Emergency Call feature appears to have resurfaced for a third time in iOS 6.1. With the right sequence of button clicking, it's possible to get to an iPhone user's voicemails, contacts, and photos—even if the iPhone is locked and password protected..."
- https://secunia.com/advisories/52173/

Access restriction in iOS 6 partially useless
- http://h-online.com/-1805842
19 Feb 2013

Rapid growth in transaction logs, CPU use, and memory consumption in Exchange Server 2010 when a user syncs a mailbox by using an iOS 6.1-based device
- http://support.micro....com/kb/2814847
Last Review: February 12, 2013 - Revision: 5.0
Status: Apple and Microsoft are investigating this issue. We will post more information in this article when the information becomes available...
Workaround: To work around this issue, do not process Calendar items such as meeting requests on iOS 6.1 devices. Also, immediately restart the iOS 6.1 device...

:ph34r: :ph34r:


Edited by AplusWebMaster, 19 February 2013 - 07:00 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#116 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 19 February 2013 - 06:01 PM

FYI...

iTunes 11.0.2 released
- https://support.apple.com/kb/DL1614
Feb 19, 2013

APPLE-SA-2013-02-19-1 Java for OS X 2013-001 and Mac OS X v10.6 Update 13
- http://prod.lists.ap...b/msg00002.html
2013-02-19
- http://support.apple.com/kb/HT5666
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 20 February 2013 - 11:44 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#117 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 20 February 2013 - 06:50 AM

FYI...

iOS 6.1.2 Software Update
- https://support.apple.com/kb/DL1639
Feb 19, 2013 - "Fixes an Exchange calendar bug that could result in increased network activity and reduced battery life...
System Requirements: iPhone 3GS and later, iPad 2 and later, iPod touch 4th generation and later, iPhone 5 ..."

- http://support.micro....com/kb/2814847
Last Review: February 19, 2013 Revision: 15.0 - "... Resolution: Apple has posted the following article to address the issue:
- https://support.apple.com/kb/TS4532
Feb 19, 2013 - ... Resolution: To resolve this issue, update to iOS 6.1.2..."

:ph34r: :ph34r:


Edited by AplusWebMaster, 20 February 2013 - 07:16 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#118 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 28 February 2013 - 05:56 AM

FYI...

Amazon fixes its book deleting iTunes Kindle app update
- http://www.theinquir...ndle-app-update
Feb 28 2013 - "... Amazon has revisited the webpage and the update. Version 3.6.2* of the Kindle app for iOS includes both a fix for the registration issue and "Various Bug Fixes and Security Fixes"..."
* https://itunes.apple...d302584613?mt=8
Updated: Feb 27, 2013
Version: 3.6.2
Size: 21.4 MB
What's New in Version 3.6.2
• Fix for Registration Issue
• Various Bug Fixes and Security Fixes...
 

:( :ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#119 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 02 March 2013 - 07:29 PM

FYI...

Apple blocks older insecure versions of Flash...
- https://isc.sans.edu...l?storyid=15316
Last Updated: 2013-03-02 18:23:36 - "Apple has recently stepped up its response to security issues involving 3rd party plug-ins. They have aggressively used its anti-malware tool sets to enforce minimum versions of Adobe Flash*, Oracle Java, and similar popular plug-ins..."
* https://support.apple.com/kb/ht5655
Mar 1, 2013 - "... When attempting to view Flash content in Safari, you may see this alert: "Blocked Plug-in"
Selecting it will display this alert:
'Adobe Flash Player' is out of date.
- Click 'Download Flash…' to have Safari open the Adobe Flash Player installer website.
- Download the latest Adobe Flash Player installer--click the "Download now" button.
- Open the downloaded disk image.
- Open the installer and follow the onscreen instructions...'"

- https://support.apple.com/kb/HT5660
Mar 1, 2013

:ph34r: :ph34r:


Edited by AplusWebMaster, 02 March 2013 - 08:07 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#120 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 05 March 2013 - 06:25 AM

FYI...

APPLE-SA-2013-03-04-1: Apple Mac OS X update for Java
- https://secunia.com/advisories/52484/
Release Date: 2013-03-05
Criticality level: Highly critical
Impact: System access
Where: From remote
CVE Reference(s): CVE-2013-0809, CVE-2013-1493
For more information: https://secunia.com/SA52451/
Original Advisory: APPLE-SA-2013-03-04-1:
- http://support.apple.com/kb/HT5677
- http://prod.lists.ap.../Mar/index.html

- http://prod.lists.ap...r/msg00000.html
___

Apple Web Server notifications
- https://support.apple.com/kb/HT1318
Products Affected: Mac OS X Server, Product Security
Last Modified: Feb 23, 2013

:ph34r: :ph34r:


Edited by AplusWebMaster, 11 March 2013 - 04:08 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#121 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 14 March 2013 - 05:18 PM

FYI...

Safari v6.0.3 released
- https://support.apple.com/kb/HT5671
14 Mar 2013
> http://prod.lists.ap...r/msg00003.html

- https://secunia.com/advisories/52658/
Release Date: 2013-03-15
Criticality level: Highly critical
Impact: Cross Site Scripting, System access
Where: From remote ...
Solution: Update to version 6.0.3.

- http://www.securityt....com/id/1028292
CVE Reference: CVE-2013-0960, CVE-2013-0961
Mar 14 2013
Impact: Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 6.0.3...
___

APPLE-SA-2013-03-14-1 OS X Mountain Lion v10.8.3 and Security Update 2013-001
- https://support.apple.com/kb/HT5672
14 Mar 2013
> http://prod.lists.ap...r/msg00002.html

- http://prod.lists.ap.../Mar/index.html

- https://secunia.com/advisories/52643/
Release Date: 2013-03-15
Criticality level: Highly critical
Impact: Spoofing, Security Bypass, Exposure of system information, Exposure of sensitive, information, Cross Site Scripting, System access
Where: From remote ...
Solution: Update to OS X Mountain Lion 10.8.3 or apply Security Update 2013-001.

- http://atlas.arbor.n...dex#-1321171050
High Severity
March 15, 2013
Apple releases security patches for a variety of issues in OSX.
Analysis: Considering a typical attack on a end-user system, there are several issues that require attention to include: 1) A method for an attacker to launch a Java application even though Java may be disabled 2) Quicktime security vulnerabilities in the handling of MP4 files and 3) security issues in the way PDFKit handles certain malformed PDF documents. In addition to these issues there are multiple other issues that affect specific scenarios on a server install or issues that would open up the system to a local attack...

- http://www.securityt....com/id/1028294
CVE Reference: CVE-2013-0963, CVE-2013-0967, CVE-2013-0969, CVE-2013-0970, CVE-2013-0971, CVE-2013-0973, CVE-2013-0976
Updated: Mar 15 2013
Impact: Execution of arbitrary code via network, Modification of system information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.6.x, 10.7.x, 10.8.x...

About the OS X Mountain Lion v10.8.3 Update
- https://support.apple.com/kb/HT5612
Mar 14, 2013

OS X Mountain Lion Update v10.8.3 (Combo)
- https://support.apple.com/kb/DL1640
Mar 14, 2013

Security Update 2013-001 (Snow Leopard)
- https://support.apple.com/kb/DL1642
Mar 14, 2013

Security Update 2013-001 (Lion)
- https://support.apple.com/kb/DL1643
Mar 14, 2013

:ph34r: :ph34r:


Edited by AplusWebMaster, 16 March 2013 - 02:28 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#122 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 20 March 2013 - 06:47 AM

FYI...

APPLE-SA-2013-03-19-1 iOS 6.1.3
- http://prod.lists.ap...r/msg00004.html
19 Mar 2013

- https://support.apple.com/kb/HT5704

- http://www.securityt....com/id/1028314
CVE Reference: CVE-2013-0977, CVE-2013-0978, CVE-2013-0979, CVE-2013-0981
Mar 19 2013
Impact: Disclosure of system information, Execution of arbitrary code via local system, Modification of system information, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 6.1.3...
Impact: A local user can obtain elevated privileges on the target system.
Solution: The vendor has issued a fix (iOS 6.1.3) as part of APPLE-SA-2013-03-19-1 iOS 6.1.3.

- https://secunia.com/advisories/52173/
Last Update: 2013-03-20
Criticality level: Highly critical
Impact: Security Bypass, System access
Where: From remote...
Operating System: Apple iOS 6.x for iPhone 3GS and later, iPad 6.x, iPod touch 6.x
Solution: Apply iOS 6.1.3 Software Update.
___

APPLE-SA-2013-03-19-2 Apple TV 5.2.1
- http://prod.lists.ap...r/msg00005.html
19 Mar 2013

- https://secunia.com/advisories/52685/
Release Date: 2013-03-20
CVE Reference(s): CVE-2013-0977, CVE-2013-0978, CVE-2013-0981
Impact: Security Bypass
Where: Local system
Solution: Update to version 5.2.1.
___

Apple changes iOS 6.1 VPN feature
- http://h-online.com/-1837018
8 April 2013
 

:ph34r:


Edited by AplusWebMaster, 08 April 2013 - 11:42 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#123 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 17 April 2013 - 08:31 AM

FYI...

Safari 6.0.4 released
- https://support.apple.com/kb/HT5701
Apr 16, 2013

- https://support.apple.com/kb/HT1222
___

http://h-online.com/-1843736
17 April 2013
 

:ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#124 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 07 May 2013 - 11:26 AM

FYI...

iOS 6.1.4 update
- https://support.apple.com/kb/DL1652
May 2, 2013 - "This update contains security content originally included in previous iOS Software Updates..."

- http://nakedsecurity...e-to-ios-6-1-4/
May 3, 2013 - "... iPhone 5 only..."

iOS: How to update...
- https://support.apple.com/kb/HT4623
 

:ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#125 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 17 May 2013 - 05:09 AM

FYI...

iTunes 11.0.3 released
- https://support.apple.com/kb/HT5766
May 16, 2013

- http://prod.lists.ap...y/msg00000.html
May 16, 2013

Use Apple Software Update
-or-
- https://www.apple.com/itunes/download/
iTunes 11.0.3 for Windows XP, Vista or Windows 7

- http://www.securityt....com/id/1028575
CVE Reference: CVE-2013-0879, CVE-2013-0991, CVE-2013-0992, CVE-2013-0993, CVE-2013-0994, CVE-2013-0995, CVE-2013-0996, CVE-2013-0997, CVE-2013-0998, CVE-2013-0999, CVE-2013-1000, CVE-2013-1001, CVE-2013-1002, CVE-2013-1003, CVE-2013-1004, CVE-2013-1005, CVE-2013-1006, CVE-2013-1007, CVE-2013-1008, CVE-2013-1010, CVE-2013-1011, CVE-2013-1014
May 16 2013
Impact: Execution of arbitrary code via network, Modification of authentication information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes ...
Impact: A remote user can execute arbitrary code on the target system.
A remote user can spoof digital certificates.
Solution: The vendor has issued a fix (11.0.3).
 

:ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#126 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 23 May 2013 - 04:45 AM

FYI...

QuickTime 7.7.4 released
- https://support.apple.com/kb/HT5770
May 22, 2013

- https://support.apple.com/kb/HT1222

> http://prod.lists.ap...y/msg00001.html
... QuickTime 7.7.4 may be obtained from the QuickTime Downloads site:
http://www.apple.com...ktime/download/
-or-
Use Apple Software Update.

- https://secunia.com/advisories/53520/
Release Date: 2013-05-23
Criticality level: Highly critical
Impact: System access
Where: From remote...
CVE Reference(s): CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0989, CVE-2013-1015, CVE-2013-1016, CVE-2013-1017, CVE-2013-1018, CVE-2013-1019, CVE-2013-1020, CVE-2013-1021, CVE-2013-1022
... vulnerabilities are reported in versions prior to 7.7.4.
Solution: Update to version 7.7.4.

- http://www.securityt....com/id/1028589
CVE Reference: CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0989, CVE-2013-1015, CVE-2013-1016, CVE-2013-1017, CVE-2013-1018, CVE-2013-1019, CVE-2013-1020, CVE-2013-1021, CVE-2013-1022
May 23 2013
Impact: Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 7.7.4 ...

- http://h-online.com/-1868186
23 May 2013
 

:ph34r:


Edited by AplusWebMaster, 23 May 2013 - 02:55 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#127 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 05 June 2013 - 04:38 AM

FYI...

Apple OS X 10.8.4 - Security Update 2013-002
- http://www.securityt....com/id/1028625
CVE Reference: CVE-2013-0982, CVE-2013-0983, CVE-2013-0984, CVE-2013-0985, CVE-2013-0975, CVE-2013-0990, CVE-2013-1024
Jun 5 2013
Impact: Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.8.x prior to 10.8.4; 10.6.x, 10.7.x ...
Solution: The vendor has issued a fix (10.8.4; Security Update 2013-002).
Vendor URL: http://support.apple.com/kb/HT5784

- http://prod.lists.ap...n/msg00000.html

 

- https://secunia.com/advisories/53684/
Release Date: 2013-06-05
Criticality level: Highly critical
Impact: Cross Site Scripting, Exposure of sensitive information, Security Bypass, DoS,
System access
Where: From remote...  

- http://h-online.com/-1883007
5 June 2013

- https://support.apple.com/kb/HT1222
___

Safari v6.0.5 released
- http://www.securityt....com/id/1028627
CVE Reference: CVE-2013-0926, CVE-2013-1009, CVE-2013-1012, CVE-2013-1013, CVE-2013-1023
Jun 5 2013
Impact: Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 6.0.5
Solution: The vendor has issued a fix (6.0.5).
Vendor URL: http://support.apple.com/kb/HT5785

- http://prod.lists.ap...n/msg00001.html

 

- https://secunia.com/advisories/53711/
Release Date: 2013-06-05
Criticality level: Highly critical
Impact: Security Bypass, Cross Site Scripting, Spoofing, System access
Where: From remote...
___

- https://isc.sans.edu...l?storyid=15929
Last Updated: 2013-06-05 02:43:44 UTC
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 05 June 2013 - 06:16 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#128 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 19 June 2013 - 01:13 PM

FYI...

Apple Mac OS X update for Java
- https://secunia.com/advisories/53890/
Release Date: 2013-06-19
Criticality level: Highly critical
Impact: Manipulation of data, Exposure of sensitive information, Privilege escalation, DoS, System access
Where: From remote ...
For more information: https://secunia.com/SA53846/
Original Advisory: APPLE-SA-2013-06-18-1:
http://support.apple.com/kb/HT5797
"...  issues were addressed by updating to Java version 1.6.0_51 ..."

- http://prod.lists.ap...n/msg00002.html
18 Jun 2013
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 19 June 2013 - 02:16 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#129 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 03 July 2013 - 07:13 AM

FYI...

Apple Mac OS X update 2013-003
- https://secunia.com/advisories/54049/
Release Date: 2013-07-03
Criticality: Highly Critical
Where: From remote
Impact: System access
CVE Reference(s): CVE-2013-1018, CVE-2013-1019, CVE-2013-1022
Also see: https://secunia.com/SA53520/
Solution: Apply Security Update 2013-003.
Original Advisory:
http://lists.apple.c...l/msg00000.html

- http://support.apple.com/kb/HT5806
 

:ph34r: :ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#130 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 20 July 2013 - 10:10 AM

FYI...

MacBook Air (Mid 2013) Software Update 1.0
- https://support.apple.com/kb/DL1672
Jul 18, 2013 - "This update is recommended for MacBook Air (mid 2013) models. This update fixes an issue that in rare instances may cause an intermittent loss in wireless connectivity, an issue with Adobe Photoshop which may cause occasional screen flickering, and an issue which may cause audio volume to fluctuate during video playback."
 

:ph34r:


Edited by AplusWebMaster, 20 July 2013 - 10:10 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#131 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 09 September 2013 - 04:37 AM

FYI...

Apple AirPort - Firmware update 7.6.4
- https://secunia.com/advisories/54733/
Release Date: 2013-09-09
CVE Reference: https://web.nvd.nist...d=CVE-2013-5132
... vulnerability can be exploited by malicious people to cause a DoS... reported in firmware versions prior to 7.6.4.
Solution: Update to firmware version 7.6.4 via AirPort Utility.
Original Advisory: Apple (HT5920):
http://support.apple.com/kb/HT5920
 

:ph34r:


Edited by AplusWebMaster, 09 September 2013 - 04:44 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#132 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 13 September 2013 - 07:11 AM

FYI...

Safari 5.1.10 released
- https://secunia.com/advisories/54827/
Release Date: 2013-09-13
Criticality: Highly Critical
Where: From remote
Impact: System access
Software: Apple Safari 5.x
CVE Reference(s): CVE-2012-3748, CVE-2013-0997
... vulnerabilities are reported in versions prior to 5.1.10 running on OS X Snow Leopard version 10.6.8 and OS X Snow Leopard Server version 10.6.8.
Solution: Update to version 5.1.10.
Original Advisory: APPLE-SA-2013-09-12-2:
http://support.apple.com/kb/HT5921
http://lists.apple.c...p/msg00003.html
___

Apple Mac OS X Security Update 2013-004
- https://secunia.com/advisories/54829/
Release Date: 2013-09-13
Criticality: Highly Critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Spoofing, Brute force, Exposure of sensitive information, Privilege escalation, DoS, System access
CVE Reference(s): CVE-2012-0883, CVE-2012-2686, CVE-2012-2687, CVE-2012-3499, CVE-2012-3817, CVE-2012-4244, CVE-2012-4558, CVE-2012-5166, CVE-2012-5688, CVE-2013-0166, CVE-2013-0169, CVE-2013-1025, CVE-2013-1026, CVE-2013-1027, CVE-2013-1028, CVE-2013-1029, CVE-2013-1030, CVE-2013-1031, CVE-2013-1032, CVE-2013-1033, CVE-2013-1635, CVE-2013-1643, CVE-2013-1775, CVE-2013-1824, CVE-2013-1899, CVE-2013-1900, CVE-2013-1901, CVE-2013-2020, CVE-2013-2021,
CVE-2013-2110, CVE-2013-2266
... vulnerabilities are reported in versions prior to 10.8.5.
Solution: Update to version 10.8.5 or apply Security Update 2013-004.
Original Advisory: APPLE-SA-2013-09-12-1:
http://lists.apple.c...p/msg00002.html
Security Update 2013-004:
http://support.apple.com/kb/HT5880
___

Flash Player updates available for OS X ...
- http://support.apple.com/kb/HT5655
Last Modified: Sep 13, 2013
- http://lists.apple.c...p/msg00001.html
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 14 September 2013 - 04:17 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#133 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 18 September 2013 - 06:17 AM

FYI...

Apple OS X Server v2.2.2 released
- https://secunia.com/advisories/54891/
Release Date: 2013-09-18
Criticality: Moderately Critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Brute force, DoS, System access
Solution Status: Vendor Patch
Software: Apple OS X Server 2.x
CVE Reference(s): CVE-2013-1034, CVE-2013-1899, CVE-2013-1900, CVE-2013-1901, CVE-2013-2020,
CVE-2013-2021
... vulnerabilities are reported in versions prior to 2.2.2.
Original Advisory: APPLE-SA-2013-09-17-1:
http://support.apple.com/kb/HT5892

- http://www.securityt....com/id/1029047
CVE Reference: CVE-2013-1034
Sep 17 2013
Impact: Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): OS X 10.8; OS X Server prior to 2.2.2...
 

:ph34r: :ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#134 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 19 September 2013 - 05:44 AM

FYI...

iOS7 released
- http://support.apple.com/kb/HT5934
Sep 18, 2013
- http://lists.apple.c...p/msg00006.html

- https://secunia.com/advisories/54886/
Release Date: 2013-09-19
Criticality: Highly Critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Spoofing, Brute force, Exposure of sensitive information, DoS, System access
Operating System: Apple iOS 4.x for iPhone 3GS and later, Apple iOS 4.x for iPhone 4 (CDMA), Apple iOS 5.x for iPhone 3GS and later, Apple iOS 6.x for iPhone 3GS and later, Apple iOS for iPad 4.x, Apple iOS for iPad 5.x, Apple iOS for iPad 6.x, Apple iOS for iPod touch 6.x ...
Solution: Upgrade to version 7...
Original Advisory: APPLE-SA-2013-09-18-2:
http://support.apple.com/kb/HT5934

- http://www.securityt....com/id/1029054
CVE Reference: CVE-2011-2391, CVE-2013-0957, CVE-2013-1036, CVE-2013-1037, CVE-2013-1038, CVE-2013-1039, CVE-2013-1040, CVE-2013-1041, CVE-2013-1042, CVE-2013-1043, CVE-2013-1044, CVE-2013-1045, CVE-2013-1046, CVE-2013-1047, CVE-2013-3950, CVE-2013-3953, CVE-2013-3954, CVE-2013-3955, CVE-2013-4616, CVE-2013-5125, CVE-2013-5126, CVE-2013-5127, CVE-2013-5128, CVE-2013-5129, CVE-2013-5131, CVE-2013-5134, CVE-2013-5137, CVE-2013-5138, CVE-2013-5139, CVE-2013-5140, CVE-2013-5141, CVE-2013-5142, CVE-2013-5145, CVE-2013-5149, CVE-2013-5150, CVE-2013-5151, CVE-2013-5152, CVE-2013-5153, CVE-2013-5154, CVE-2013-5155, CVE-2013-5156, CVE-2013-5157, CVE-2013-5158, CVE-2013-5159
Sep 18 2013
Impact: Denial of service via local system, Denial of service via network, Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 7 ...

- http://www.securityt....com/id/1029072
Sep 20 2013
Impact: User access via local system
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 7
... A local user can invoke the Apple Control Center and bypass the passcode lock screen to access photos and related photo sharing applications.... No solution was available at the time of this entry.
The vendor is working on a fix...
___

- http://www.theinquir...ate-apple-users
Sep 19 2013 - "... Apple released its iOS 7 mobile operating system update on Wednesday, although download problems have meant that thousands still haven't been able to upgrade to the latest software. As seems typical with iOS updates, the release of iOS 7 didn't go smoothly. Thousands of keen iPhone and iPad users tried to download the iOS 7 update as soon as it went live... some users inundated with error messages after trying to install the software, while others were unable to download it at all... download failures likely having occurred because the firm's network and servers infrastructure couldn't handle the huge surge in traffic..."
___


iTunes 11.1 released
- http://support.apple.com/kb/HT5936
Sep 18, 2013
- http://lists.apple.c...p/msg00005.html

- https://secunia.com/advisories/54893/
Release Date: 2013-09-19
Criticality: Highly Critical
Where: From remote
Impact: System access
CVE Reference: https://web.nvd.nist...d=CVE-2013-1035 - 9.3 (HIGH)
... vulnerability is reported in versions prior to 11.1.
Solution: Update to version 11.1.
Original Advisory: APPLE-SA-2013-09-18-1:
http://support.apple.com/kb/HT5936

- http://www.securityt....com/id/1029053
CVE Reference: CVE-2013-1035
Sep 18 2013
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 11.1 ...
 

:ph34r:


Edited by AplusWebMaster, 21 September 2013 - 11:53 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#135 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 24 September 2013 - 04:38 AM

FYI...

Apple TV 6.0 released
- http://support.apple.com/kb/HT5935
Last Modified: Sep 20, 2013
- http://lists.apple.c...p/msg00008.html

- https://secunia.com/advisories/54961/
Release Date: 2013-09-23
Criticality: Highly Critical
Where: From remote
Impact: Security Bypass, DoS, System access
... weakness and the vulnerabilities are reported in versions prior to 6.0.
Solution: Upgrade to version 6.0.
Original Advisory: APPLE-SA-2013-09-20-1:
http://support.apple.com/kb/HT5935
___

Xcode 5.0 released
- http://support.apple.com/kb/HT5937
Last Modified: Sep 18, 2013 - Available for: OS X Mountain Lion v10.8.4 or later...
- http://lists.apple.c...p/msg00007.html
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 24 September 2013 - 04:38 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#136 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 26 September 2013 - 09:06 PM

FYI...

iOS 7.0.2 released
- http://support.apple.com/kb/HT5957
Sep 26, 2013
- http://lists.apple.c...p/msg00009.html

- http://www.securityt....com/id/1029100
CVE Reference:
- https://web.nvd.nist...d=CVE-2013-5160 - 3.3
- https://web.nvd.nist...d=CVE-2013-5161 - 4.4
Sep 26 2013
Impact: User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0 ...
Solution: The vendor has issued a fix (7.0.2)...
___

iPhone and iPad users - iMessage bug in iOS 7
- http://www.theinquir...ge-bug-in-ios-7
Oct 01 2013 - "... some of Apple's forum members appear to have discovered a solution for the problem. Those suffering from the bug should disable iMessage in Settings > Messages, then reset the iPhone's network under Settings > General > Reset, then enable iMessage again. We've tried this, and our iMessage function seems to be back up and running as normal..."
 

:ph34r:
 


Edited by AplusWebMaster, 01 October 2013 - 04:03 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#137 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 04 October 2013 - 06:04 AM

FYI...

Apple OS X v10.8.5 Supplemental Update
- http://support.apple.com/kb/HT5964
Oct 3, 2013
- http://lists.apple.c...t/msg00000.html

- http://www.securityt....com/id/1029126
CVE Reference: https://web.nvd.nist...d=CVE-2013-5163 - 6.6
Oct 3 2013
Impact: Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.8 - 10.8.5...
The vendor's advisory is available at:
http://support.apple.com/kb/HT5964
___

iTunes 11.1.1
- https://support.apple.com/kb/DL1614
Oct 2, 2013 - "This update resolves an issue that may cause iTunes Extras to display incorrectly, fixes a problem with deleted podcasts, and improves stability..."
 

:ph34r:


Edited by AplusWebMaster, 13 October 2013 - 06:43 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#138 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 16 October 2013 - 08:28 AM

FYI...

Apple-SA-2013-10-15-1 Java for OS X 2013-005 and Mac OS X v10.6 Update 17
- http://lists.apple.c...t/msg00001.html
15 Oct 2013

- https://secunia.com/advisories/55328/
Release Date: 2013-10-16
Criticality: Highly Critical
Where: From remote
Impact: Manipulation of data, Exposure of sensitive information, DoS, System access
CVE Reference(s): CVE-2013-3829, CVE-2013-4002, CVE-2013-5772, CVE-2013-5774, CVE-2013-5775, CVE-2013-5776, CVE-2013-5777, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5788, CVE-2013-5789, CVE-2013-5790, CVE-2013-5797, CVE-2013-5800, CVE-2013-5801, CVE-2013-5802, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5805, CVE-2013-5806, CVE-2013-5809, CVE-2013-5810, CVE-2013-5812, CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819, CVE-2013-5820, CVE-2013-5823, CVE-2013-5824, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830, CVE-2013-5831, CVE-2013-5832, CVE-2013-5838, CVE-2013-5840, CVE-2013-5842, CVE-2013-5843, CVE-2013-5844, CVE-2013-5846, CVE-2013-5848, CVE-2013-5849, CVE-2013-5850, CVE-2013-5851, CVE-2013-5852, CVE-2013-5854
... update for Java for Mac OS X. This fixes multiple vulnerabilities, which can be exploited by malicious users to manipulate certain data and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
For more information: https://secunia.com/SA55315/
Solution: Apply Java for OS X 2013-005 or Mac OS X v10.6 Update 17 (please see the vendor's advisory for details).
Original Advisory: APPLE-SA-2013-10-15-1:
http://lists.apple.c...t/msg00001.html
 

:ph34r: :ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#139 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 23 October 2013 - 05:30 AM

FYI...

iOS 7.0.3 ...
- http://lists.apple.c...t/msg00002.html
22 Oct 2013
- https://secunia.com/advisories/55447/
Release Date: 2013-10-23
NOT Critical ...
- http://www.securityt....com/id/1029233
CVE Reference: CVE-2013-5144, CVE-2013-5162, CVE-2013-5164
Oct 23 2013
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0.2; iPhone 4 and later ...
Solution: The vendor has issued a fix (7.0.3).
The vendor's advisory is available at:
http://support.apple.com/kb/HT6010
___

Safari 6.1 ...
- http://lists.apple.c...t/msg00003.html
22 Oct 2013
- https://secunia.com/advisories/55448/
Release Date: 2013-10-23
Criticality: Highly Critical
Where: From remote
Impact: Cross Site Scripting, Exposure of sensitive information, System access
CVE Reference(s): CVE-2013-1036, CVE-2013-1037, CVE-2013-1038, CVE-2013-1039, CVE-2013-1040,
CVE-2013-1041, CVE-2013-1042, CVE-2013-1043, CVE-2013-1044, CVE-2013-1045, CVE-2013-1046,
CVE-2013-1047, CVE-2013-2842, CVE-2013-2848, CVE-2013-5125, CVE-2013-5126, CVE-2013-5127,
CVE-2013-5128, CVE-2013-5129, CVE-2013-5130, CVE-2013-5131
... vulnerabilities are reported in versions prior to 6.1.
Solution: Update to version 6.1.
Original Advisory: APPLE-SA-2013-10-22-2:
http://support.apple.com/kb/HT6000
___

OS X Mavericks v10.9 ...
- http://lists.apple.c...t/msg00004.html
22 Oct 2013
- https://secunia.com/advisories/55446/
Release Date: 2013-10-23
Criticality: Highly Critical
Where: From remote
Impact: Hijacking, Security Bypass, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access
Operating System: Apple Macintosh OS X
CVE Reference(s): CVE-2011-2391, CVE-2011-3389, CVE-2011-3427, CVE-2011-4944, CVE-2012-0845,
CVE-2012-0876, CVE-2012-1150, CVE-2013-0249, CVE-2013-1667, CVE-2013-1944, CVE-2013-3950, CVE-2013-3954, CVE-2013-4073, CVE-2013-5135, CVE-2013-5138, CVE-2013-5139, CVE-2013-5141,
CVE-2013-5142, CVE-2013-5145, CVE-2013-5165, CVE-2013-5166, CVE-2013-5167, CVE-2013-5168,
CVE-2013-5169, CVE-2013-5170, CVE-2013-5171, CVE-2013-5172, CVE-2013-5173, CVE-2013-5174,
CVE-2013-5175, CVE-2013-5176, CVE-2013-5177, CVE-2013-5178, CVE-2013-5179, CVE-2013-5180, CVE-2013-5181, CVE-2013-5182, CVE-2013-5183, CVE-2013-5184, CVE-2013-5185, CVE-2013-5186,
CVE-2013-5187, CVE-2013-5188, CVE-2013-5189, CVE-2013-5190, CVE-2013-5191, CVE-2013-5192
Solution: Update to version 10.9 (Maverick).
Original Advisory: APPLE-SA-2013-10-22-3:
http://support.apple.com/kb/HT6011
http://lists.apple.c...t/msg00004.html
___

iTunes 11.1.2
- http://lists.apple.c...t/msg00009.html
22 Oct 2013
- https://secunia.com/advisories/55442/
Release Date: 2013-10-23
Criticality: Highly Critical
Where: From remote
Impact: Exposure of sensitive information, DoS, System access
Solution Status: Vendor Patch
CVE Reference(s): CVE-2011-3102, CVE-2012-0841, CVE-2012-2807, CVE-2012-2825, CVE-2012-2870,
CVE-2012-2871, CVE-2012-5134, CVE-2013-1024, CVE-2013-1037, CVE-2013-1038, CVE-2013-1039, CVE-2013-1040, CVE-2013-1041, CVE-2013-1042, CVE-2013-1043, CVE-2013-1044, CVE-2013-1045,
CVE-2013-1046, CVE-2013-1047, CVE-2013-2842, CVE-2013-5125, CVE-2013-5126, CVE-2013-5127,
CVE-2013-5128
... vulnerabilities are reported in versions prior to 11.1.2.
Solution: Update to version 11.1.2.
Original Advisory: APPLE-SA-2013-10-22-8:
http://support.apple.com/kb/HT6001
 

:ph34r: :ph34r: :ph34r:


Edited by AplusWebMaster, 23 October 2013 - 10:24 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#140 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 04 November 2013 - 01:30 PM

FYI...

OS X Mavericks upgr. destroys data, reports WD
Issues extend to external hard drives, as well as eSATA- or Thunderbolt-based peripherals from other vendors
- http://www.infoworld...-digital-230100
Nov 04, 2013
 

:ph34r: :ph34r: :(


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#141 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 14 November 2013 - 02:32 PM

FYI...

iOS 7.0.4 released
- http://lists.apple.c...v/msg00000.html
14 Nov 2013
CVE-2013-5193
Impact: App and In-App purchases may be completed with insufficient authorization
Description: A signed-in user may be able to complete a transaction without providing a password when prompted. This issue was addressed by additional enforcement of purchase authorization.
... update is available through iTunes and Software Update on your iOS device, and will -not- appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes...

- http://www.securityt....com/id/1029346
CVE Reference: CVE-2013-5193
Nov 14 2013
Impact: Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0.3 and prior...
Impact: A local user can make purchases without proper authorization.
Solution: The vendor has issued a fix (7.0.4)...
The vendor's advisory is available at:
- http://support.apple.com/kb/HT6058
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 15 November 2013 - 06:41 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#142 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 17 December 2013 - 09:22 AM

FYI...

Safari 7.0.1 released
- https://secunia.com/advisories/56122/
Release Date: 2013-12-17
Criticality: Highly Critical
Where: From remote
Impact: Security Bypass, System access
CVE Reference(s): CVE-2013-2909, CVE-2013-5195, CVE-2013-5196, CVE-2013-5197, CVE-2013-5198,
CVE-2013-5199, CVE-2013-5225, CVE-2013-5227, CVE-2013-5228
Solution: Update to version 6.1.1. or 7.0.1.
Original Advisory: APPLE-SA-2013-12-16-1:
http://support.apple.com/kb/HT6082
___

OSX 10.9.1 released
- https://secunia.com/advisories/56144/
Release Date: 2013-12-17
Criticality: Highly Critical
Where: From remote
Impact: Security Bypass, System access
CVE Reference(s): CVE-2013-2909, CVE-2013-5195, CVE-2013-5196, CVE-2013-5197, CVE-2013-5198,
CVE-2013-5199, CVE-2013-5225, CVE-2013-5227, CVE-2013-5228
For more information: https://secunia.com/SA56122/
... security issue and vulnerabilities are reported in version 10.9.
Solution: Update to version 10.9.1.
Original Advisory: APPLE-SA-2013-12-16-2:
http://support.apple.com/kb/HT6084
 

:ph34r: :ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#143 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 20 December 2013 - 07:37 AM

FYI...

Apple Motion 5.1 released
- http://www.securityt....com/id/1029521
CVE Reference: https://web.nvd.nist...d=CVE-2013-6114 - 5.0
Dec 19 2013
Impact: Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 5.1 ...
Solution: The vendor has issued a fix (5.1), available from the Mac App Store.
The vendor's advisory is available at: http://support.apple.com/kb/HT6041

- https://secunia.com/advisories/56196/
Release Date: 2013-12-20
Criticality: Highly Critical
Where: From remote
Impact: System access ...
CVE Reference: CVE-2013-6114
... vulnerability is reported in versions prior to 5.1.
Solution: Update to version 5.1.
Original Advisory: APPLE-SA-2013-12-19-1:
- http://support.apple.com/kb/HT6041
 

:ph34r: :ph34r:


This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#144 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 22 January 2014 - 08:21 PM

FYI...

iTunes 11.1.4 released
- https://support.apple.com/kb/HT6001
Jan 22, 2014
CVE-2011-3102, CVE-2012-0841, CVE-2012-2807, CVE-2012-2825, CVE-2012-5134, CVE-2012-2870, CVE-2012-2871, CVE-2013-1024, CVE-2013-1037, CVE-2013-1038, CVE-2013-1039, CVE-2013-1040, CVE-2013-1041, CVE-2013-1042, CVE-2013-1043, CVE-2013-1044, CVE-2013-1045, CVE-2013-1046, CVE-2013-1047, CVE-2013-2842, CVE-2013-5125, CVE-2013-5126, CVE-2013-5127, CVE-2013-5128,
CVE-2014-1242

Use Apple Software Update to get it.

- http://www.securityt....com/id/1029671
- https://web.nvd.nist...d=CVE-2014-1242 - 5.8
Jan 23 2014
Impact:   Disclosure of system information, Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 11.1.4
Description:  A vulnerability was reported in Apple iTunes. A remote user can conduct man-in-the-middle attacks.
Solution: The vendor has issued a fix (11.1.4)...
 

:ph34r:


Edited by AplusWebMaster, 24 January 2014 - 07:22 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#145 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 24 January 2014 - 08:32 AM

FYI...

Apple Pages 5.1 / 2.1 released
- https://secunia.com/advisories/56630/
Release Date: 2014-01-24
Criticality: Highly Critical
Where: From remote
Impact: System access...
Software: Apple Pages 5.x
CVE Reference: https://web.nvd.nist...d=CVE-2014-1252 - 7.5 (HIGH)
... vulnerability is reported in versions prior to 5.1.
Solution: Update to version 5.1.
Original Advisory: APPLE-SA-2014-01-23-1:
http://support.apple.com/kb/HT6117
Jan 23, 2014

- https://itunes.apple...409201541?mt=12
Updated: Jan 23, 2014
Version: 5.1

- https://www.apple.co...port/ios/pages/

- https://secunia.com/advisories/56615/
Release Date: 2014-01-24
Criticality: Highly Critical
Where: From remote
Impact: System access...
Software: Apple Pages for iOS 2.x
CVE Reference: CVE-2014-1252
... vulnerability is reported in versions prior to 2.1.
Solution: Update to version 2.1.

- https://itunes.apple...d361309726?mt=8
Updated: Jan 23, 2014
Version: 2.1
 

:ph34r: :scratchhead:


Edited by AplusWebMaster, 24 January 2014 - 06:13 PM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#146 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 28 January 2014 - 06:26 AM

FYI...

Missing msvcr80.dll not found after the install of iTunes latest update
Had to uninstall iTunes and reinstall...

 

Microsoft Visual C++ 2005 SP1 Redistributable Package (x64)

- http://www.microsoft...s.aspx?id=18471

- https://discussions....633790#24633790

- https://discussions....tart=0&tstart=0

... patchmanagement.org // get patchmanagement 32979
Date: Mon, 27 Jan 2014 16:32:59 -0800
From: Susan Bradley ...
___

- http://www.infoworld...-windows-235228
Jan 29, 2014
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 29 January 2014 - 10:06 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#147 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 22 February 2014 - 05:23 AM

FYI...

iOS 7.0.6
- http://support.apple.com/kb/HT6147
Feb 21, 2014 - "... Data Security: Available for: iPhone 4 and later, iPod touch (5th generation), iPad 2 and later...
CVE-2014-1266..."

- https://web.nvd.nist...d=CVE-2014-1266 - 6.8

iOS 6.1.6
- http://support.apple.com/kb/HT6146
Feb 21, 2014 - "... Data Security: Available for: iPhone 3GS, iPod touch (4th generation)...
CVE-2014-1266..."

- http://www.securityt....com/id/1029811
CVE Reference: CVE-2014-1266
Feb 21 2014
Fix Available:  Yes  Vendor Confirmed:  Yes...
Impact: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions.
Solution: The vendor has issued a fix (6.1.6, 7.0.6)...
___

Apple TV 6.0.2
- http://support.apple.com/kb/HT6148
Feb 21, 2014 - "... Apple TV: Available for: Apple TV 2nd generation and later...
CVE-2014-1266..."

- http://www.securityt....com/id/1029812
CVE Reference: CVE-2014-1266
Feb 22 2014
Fix Available:  Yes  Vendor Confirmed:  Yes...  
Impact: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions.
Solution: The vendor has issued a fix (6.0.2)...
___

Apple Releases Security Updates for iOS devices and Apple TV
- https://www.us-cert....es-and-Apple-TV
Feb 21, 2014

- http://support.apple.com/kb/HT1222
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 24 February 2014 - 11:43 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#148 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 25 February 2014 - 04:10 PM

FYI...

OS X Mavericks v10.9.2 update
- http://support.apple.com/kb/HT6114
Feb 25, 2014 - "OS X Mavericks v10.9.2 Update is recommended for all OS X Mavericks users. It improves the stability, compatibility, and security of your Mac..."
(More detail at the URL above.)

- http://lists.apple.c...b/msg00000.html

OS X Mavericks 10.9.2 and Security Update 2014-001
- http://support.apple.com/kb/HT6150
Feb 25, 2014

- http://www.securityt....com/id/1029825
CVE Reference: CVE-2014-1254, CVE-2014-1255, CVE-2014-1256, CVE-2014-1257, CVE-2014-1258, CVE-2014-1259, CVE-2014-1260, CVE-2014-1261, CVE-2014-1262, CVE-2014-1263, CVE-2014-1264, CVE-2014-1265
Feb 26 2014
Impact: Disclosure of system information, Disclosure of user information, Execution of arbitrary code via local system, Execution of arbitrary code via network, Modification of system information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.7.5, 10.8.5, 10.9, 10.9.1...
Solution: The vendor has issued a fix (OS X Mavericks v10.9.2, Security Update 2014-001)...
___

Safari 6.1.2, 7.0.2
- http://support.apple.com/kb/HT6145
Feb 25, 2014

- http://lists.apple.c...b/msg00001.html

- http://www.securityt....com/id/1029826
CVE Reference: CVE-2014-1268, CVE-2014-1269, CVE-2014-1270
Feb 26 2014
Impact: Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 6.1.2 and 7.0.2...
Solution: The vendor has issued a fix (6.1.2, 7.0.2)...
___

QuickTime 7.7.5 released
- http://support.apple.com/kb/HT6151
Feb 25, 2014 - "Available for: Windows 7, Vista, XP SP2 or later..."

- http://lists.apple.c...b/msg00002.html

- http://www.securityt....com/id/1029823
CVE Reference: CVE-2014-1243, CVE-2014-1244, CVE-2014-1245, CVE-2014-1246, CVE-2014-1247, CVE-2014-1248, CVE-2014-1249, CVE-2014-1250, CVE-2014-1251
Feb 26 2014
Impact: Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 7.7.5 for Windows...
Solution: The vendor has issued a fix (7.7.5 for Windows; on OS X apply APPLE-SA-2014-02-25-1 OS X Mavericks 10.9.2 or Security Update 2014-001)...

... use Apple Software Update.
 

:ph34r:


Edited by AplusWebMaster, 26 February 2014 - 09:27 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#149 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 11 March 2014 - 04:02 AM

FYI...

iOS 7.1 released
- http://www.securityt....com/id/1029888
CVE Reference: CVE-2013-5133, CVE-2013-6835, CVE-2014-1267, CVE-2014-1271, CVE-2014-1272, CVE-2014-1273, CVE-2014-1274, CVE-2014-1275, CVE-2014-1276, CVE-2014-1277, CVE-2014-1278, CVE-2014-1281, CVE-2014-1282, CVE-2014-1284, CVE-2014-1285, CVE-2014-1286, CVE-2014-1287, CVE-2014-1280, CVE-2014-1289, CVE-2014-1290, CVE-2014-1291, CVE-2014-1292, CVE-2014-1293, CVE-2014-1294
Mar 11 2014
Impact: Denial of service via network, Disclosure of user information, Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 7.1 ...
Solution: The vendor has issued a fix (7.1).
The vendor's advisory is available at:
- http://support.apple.com/kb/HT6162

"... Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later..."

- https://secunia.com/advisories/57294/
Release Date: 2014-03-11
Criticality: Highly Critical
Where: From remote
Impact: Security Bypass, Spoofing, Exposure of sensitive information, System access
Operating System: Apple iOS 7.x for iPhone 4 and later, Apple iOS for iPad 7.x, Apple iOS for iPod touch 7.x
Solution: Update to version 7.1.
___

Apple TV 6.1 released
- http://www.securityt....com/id/1029889
CVE Reference: CVE-2014-1267, CVE-2014-1271, CVE-2014-1272, CVE-2014-1273, CVE-2014-1275, CVE-2014-1278, CVE-2014-1279, CVE-2014-1280, CVE-2014-1282, CVE-2014-1287, CVE-2014-1289, CVE-2014-1290, CVE-2014-1291, CVE-2014-1292, CVE-2014-1293, CVE-2014-1294
Mar 11 2014
Impact: Denial of service via network, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 6.1 ...
Solution: The vendor has issued a fix (6.1).
The vendor's advisory is available at:
- http://support.apple.com/kb/HT6163

- https://secunia.com/advisories/57297/
Release Date: 2014-03-11
Criticality: Highly Critical
Where: From remote
Impact: Security Bypass, Spoofing, Exposure of sensitive information, System access
Operating System: Apple TV 6.x
Solution: Update to version 6.1.
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 11 March 2014 - 09:06 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.

#150 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 8,697 posts

Posted 02 April 2014 - 08:17 AM

FYI...

Safari 7.0.3, 6.1.3 released
- http://www.securityt....com/id/1029983
CVE Reference:   CVE-2013-2871, CVE-2014-1297, CVE-2014-1298, CVE-2014-1299, CVE-2014-1300, CVE-2014-1301, CVE-2014-1302, CVE-2014-1303, CVE-2014-1304, CVE-2014-1305, CVE-2014-1307, CVE-2014-1308, CVE-2014-1309, CVE-2014-1310, CVE-2014-1311, CVE-2014-1312, CVE-2014-1313
Apr 2 2014
Impact: Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 6.1.3 and 7.0.3
Solution: The vendor has issued a fix (6.1.3, 7.0.3).
The vendor's advisory is available at:
- http://support.apple.com/kb/HT6181
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 02 April 2014 - 08:23 AM.

This machine has no brain.
......... Use your own.
Browser check for updates here.
.




2 user(s) are reading this topic

0 members, 2 guests, 0 anonymous users

Member of ASAP and UNITE
Support SpywareInfo Forum - click the button