You are here
Home > Preporuke > Nadogradnja za Safari

Nadogradnja za Safari

  • Detalji os-a: MAC
  • Važnost: IMP
  • Operativni sustavi: M
  • Kategorije: APL

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

APPLE-SA-2015-01-27-3 Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3

Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3 are now available and
address the following:

WebKit
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10.1
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2014-3192 : cloudfuzzer
CVE-2014-4476 : Apple
CVE-2014-4477 : lokihardt@ASRT working with HP’s Zero Day
Initiative
CVE-2014-4479 : Apple

Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3 may be obtained from
the Mac App Store.

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple’s Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

—–BEGIN PGP SIGNATURE—–
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
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=bowY
—–END PGP SIGNATURE—–

_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce@lists.apple.com)

AutorTomislav Protega
Cert idNCERT-REF-2015-01-0037-ADV
CveCVE-2014-3192 CVE-2014-4476 CVE-2014-4477 CVE-2014-4479
ID izvornikaAPPLE-SA-2015-01-27-3
ProizvodSafari
Izvorhttp://www.apple.com
Top
More in Preporuke
Ranjivost SCTP protokola

Otkrivene su dvije ranjivosti u SCTP protokolu za operacijski sustav FreeBSD. Prva ranjivost uzrokovana je nedostatnom provjerom SCTP stream ID-a,...

Close