The issue was addressed by removing the dialog and refusing any revoked package. Impact: Packages could be opened after certificate revocationĭescription: When Installer encountered a revoked certificate, it would present a dialog with an option to continue. This issue was addressed through additional bounds checking.ĬVE-2013-1026 : Felix Groebert of the Google Security Team ![]() This issue was addressed through additional bounds checking.ĬVE-2013-1025 : Felix Groebert of the Google Security Teamĭescription: A buffer overflow existed in the handling of JPEG2000 encoded data in PDF files. Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code executionĭescription: A buffer overflow existed in the handling of JBIG2 encoded data in PDF files. This update addresses the issues by updating ClamAV to version 0.97.8.Īvailable for: OS X Mountain Lion v10.8 to v10.8.4 ![]() Impact: Multiple vulnerabilities in ClamAVĭescription: Multiple vulnerabilities exist in ClamAV, the most serious of which may lead to arbitrary code execution. The complete list of recognized system roots may be viewed via the Keychain Access application.Īvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5 Impact: Root certificates have been updatedĭescription: Several certificates were added to or removed from the list of system roots. CVE-2012-5688 did not affect Mac OS X v10.7 systems.Īvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4 These issues were addressed by updating BIND to version 9.8.5-P1. These issues were addressed by updating Apache to version 2.2.24.Īvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4ĭescription: Multiple vulnerabilities existed in BIND, the most serious of which may lead to a denial of service. Impact: Multiple vulnerabilities in Apacheĭescription: Multiple vulnerabilities existed in Apache, the most serious of which may lead to cross-site scripting. ![]() Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 to v10.8.4
0 Comments
Leave a Reply. |