Summary: In addition to Mavericks 10.9.5, the company
released updates for earlier OS X versions, multiple new versions of
Safari, and patches for Xcode, OS X Server and Apple TV.
In addition to the large list of vulnerabilities fixed in iOS 8, Apple has released new versions of many other products to fix many other vulnerabilities.
iOS 8 fixed 53 vulnerabilities in earlier versions. The other new
versions — OS X Mavericks 10.9.5; Security Update 2014-004; Safari 6.1.6, 7.0.6, 6.2 and 7.2; Xcode 6.0.1; OS X Server 2.2.3 and 3.2.1; and Apple TV 7 — fix another 53.
Many of the fixes in OS X Mavericks 10.9.5 and Security Update
2014-004 are problems with common open source programs which the average
user might not use. Among these are Apache mod_php, Ruby and QT Media
Foundation. But several are serious, especially the bugs in the Intel
Graphics Driver, IOAcceleratorFamily and Libnotify, one of which allows a
malicious application to execute arbitrary code with root privileges.
This is a very critical update for Mac users. All of the bugs fixed in
Apple TV were among those fixed in OS X.
Apple adds that the
new version of Mavericks "[f]ixes an issue with group membership in
large network groups, that also might prevent administrators from
performing some administrative tasks successfully" and "[a]llows for
faster authentication when roaming on 802.1x networks which use
EAP-TLS." Mavericks 10.9.5 also includes Safari 7.0.6, about which more
below.
Nearly all the flaws fixed in Safari 6.1.6, 6.2, 7.0.6 and 7.2 are
memory corruption bugs in the WebKit browser engine which could allow
remote code execution. The others are information disclosure bugs. XCode
6.0.1 stops a potential crash bug in Apache Subversion, a revision
control system.
OS X Server 2.2.3 and 3.2.1 both fix a SQL injection bug which could
allow an attacker to run arbitrary SQL queries. Version 3.2.1 also fixes
a JavaScript injection bug and multiple critical bugs in PostgreSQL.
As with the iOS 8 fixes, Ian Beer of Google Project Zero was the greatest contributor to these security disclosures.
Reference :- https://bitly.com/1qigtsS
Comments
Post a Comment