You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Safari

Sigurnosni nedostaci programskog paketa Safari

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: M
  • Kategorije: APL

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

APPLE-SA-2014-08-13-1 Safari 6.1.6 and Safari 7.0.6

Safari 6.1.6 and Safari 7.0.6 are now available and address the
following:

WebKit
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.4
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2014-1384 : Apple
CVE-2014-1385 : Apple
CVE-2014-1386 : an anonymous researcher
CVE-2014-1387 : Google Chrome Security Team
CVE-2014-1388 : Apple
CVE-2014-1389 : Apple
CVE-2014-1390 : Apple

For OS X Mavericks and OS X Mountain Lion systems, Safari 7.0.6
and Safari 6.1.6 may be obtained from Mac App Store.

For OS X Lion systems Safari 6.1.6 is available via the Apple
Software Update application.

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple’s Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

—–BEGIN PGP SIGNATURE—–
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools – http://gpgtools.org
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=cfmv
—–END PGP SIGNATURE—–

—–BEGIN PGP SIGNATURE—–
Comment: GPGTools – http://gpgtools.org
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=rGSH
—–END PGP SIGNATURE—–
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce@lists.apple.com)

AutorMarko Stanec
Cert idNCERT-REF-2014-08-0016-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa openssl

Otkriveni su sigurnosni nedostaci u programskom paketu openssl za operacijski sustav Red Hat. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog...

Close