You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa OS X Server

Sigurnosni nedostaci programskog paketa OS X Server

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: M
  • Kategorije: APL

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

APPLE-SA-2015-10-21-8 OS X Server 5.0.15

OS X Server 5.0.15 is now available and addresses the following:

BIND
Available for: OS X Yosemite 10.10.5,
OS X El Capitan 10.11.1 or later
Impact: Multiple vulnerabilities in BIND
Description: Multiple vulnerabilities existed in BIND versions prior
to 9.9.7-P3, one of which may have allowed a remote attacker to cause
a denial of service. These issues were addressed by updating BIND to
version 9.9.7-P3.
CVE-ID
CVE-2015-5722 : Hanno Böck from the Fuzzing Project
CVE-2015-5986

Web Service
Available for: OS X Yosemite 10.10.5,
OS X El Capitan 10.11.1 or later
Impact: A remote attacker may be able to bypass access restrictions
Description: An HTTP header field reference was missing from the
configuration files. This issue was addressed by adding the HTTP
header field reference to the configuration file.
CVE-ID
CVE-2015-7031 : an anonymous researcher

Installation note:

OS X Server 5.0.15 may be obtained from the Mac App Store.

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple’s Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
—–BEGIN PGP SIGNATURE—–
Comment: GPGTools – https://gpgtools.org

iQIcBAEBCgAGBQJWKAhrAAoJEBcWfLTuOo7tsN8QAIP+kwPIqIYE16y6TpbqrM00
8AcWebFjTbFVe1dfy415t4Brt125M+knKio+Q7UGxXi2xDHo1ceNTZyzfnok6oU7
DS6D9a70696wsauc9Lqc3nzkdIc2lLZRc0B1mouc0DGFnqYSEXjz8vO+sZLzOKmk
0G+v+MkXkj2rQhpBF3CmyQIfnFFv6Cw72LLk1pD+7u3b9HAiWcr4+Xt455xmMRX0
4Yg/a4o/m3Ly8QE+4TnKK9uml9GANEscUB3aSIWe5EZUb/2nU/dFgQKpBcMk75B4
hl29OuGedICeufffIvB0v/m/izZA8+WnOePn/+vHBAhklr1I5GkZrS84Nq/B1KI7
IrdjtSEs8aincUEdQSTcPj0N1kjUGKXTZzFWKcF0zUx4mRMc0isTbEwMk5i7/mIe
VGE1hwEC7M5Bv5SYOhUh+NbiN6naJLdGOeiEVuWFS7lBFlbM/6A5WHASO7+LKyGE
yj8IWeLX8V0vs6FUQ8Nd+foK0RLJ7P4l0n9SVsO/4+08Ky10lsbKHVL+1SkID/+l
NZLj74g5hENq2EoFV6Jzk8FaRCLzTA0SAWB7eSZoQ2+o6vb05mfK0Lo+Qg2HGfVG
dApFNrRBbAS5Y9Gxxjhs1rWohXA7CCnQrJWvY/dS/95VhfOqoYEwvHbeyF6g3pOD
r/5hVszdp29eso8Ti48p
=icYN
—–END PGP SIGNATURE—–

_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce@lists.apple.com)

AutorMarko Stanec
Cert idNCERT-REF-2015-10-0014-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa iTunes

Otkriveni su sigurnosni nedostaci u programskom paketu iTunes. Otkriveni nedostaci potencijalnim napadačima omogućuju rušenje programskog paketa ili izvršavanje proizvoljnog programskog...

Close