Last active
July 17, 2021 08:04
-
-
Save FredericJacobs/11189734 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
APPLE-SA-2014-04-22-1 Security Update 2014-002 | |
Security Update 2014-002 is now available and addresses the | |
following: | |
CFNetwork HTTPProtocol | |
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, | |
OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 | |
Impact: An attacker in a privileged network position can obtain web | |
site credentials | |
Description: Set-Cookie HTTP headers would be processed even if the | |
connection closed before the header line was complete. An attacker | |
could strip security settings from the cookie by forcing the | |
connection to close before the security settings were sent, and then | |
obtain the value of the unprotected cookie. This issue was addressed | |
by ignoring incomplete HTTP header lines. | |
CVE-ID | |
CVE-2014-1296 : Antoine Delignat-Lavaud of Prosecco at Inria Paris | |
CoreServicesUIAgent | |
Available for: OS X Mavericks v10.9.2 | |
Impact: Visiting a maliciously crafted website or URL may result in | |
an unexpected application termination or arbitrary code execution | |
Description: A format string issue existed in the handling of URLs. | |
This issue was addressed through additional validation of URLs. This | |
issue does not affect systems prior to OS X Mavericks. | |
CVE-ID | |
CVE-2014-1315 : Lukasz Pilorz of runic.pl, Erik Kooistra | |
FontParser | |
Available for: OS X Mountain Lion v10.8.5 | |
Impact: Opening a maliciously crafted PDF file may result in an | |
unexpected application termination or arbitrary code execution | |
Description: A buffer underflow existed in the handling of fonts in | |
PDF files. This issue was addressed through additional bounds | |
checking. This issue does not affect OS X Mavericks systems. | |
CVE-ID | |
CVE-2013-5170 : Will Dormann of CERT/CC | |
Heimdal Kerberos | |
Available for: OS X Mavericks v10.9.2 | |
Impact: A remote attacker may be able to cause a denial of service | |
Description: A reachable abort existed in the handling of ASN.1 | |
data. This issue was addressed through additional validation of ASN.1 | |
data. | |
CVE-ID | |
CVE-2014-1316 : Joonas Kuorilehto of Codenomicon | |
ImageIO | |
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 | |
Impact: Viewing a maliciously crafted JPEG image may lead to an | |
unexpected application termination or arbitrary code execution | |
Description: A buffer overflow issue existed in ImageIO's handling | |
of JPEG images. This issue was addressed through improved bounds | |
checking. This issue does not affect systems prior to OS X Mavericks. | |
CVE-ID | |
CVE-2014-1319 : Cristian Draghici of Modulo Consulting, Karl Smith of | |
NCC Group | |
Intel Graphics Driver | |
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 | |
Impact: A malicious application can take control of the system | |
Description: A validation issue existed in the handling of a pointer | |
from userspace. This issue was addressed through additional | |
validation of pointers. | |
CVE-ID | |
CVE-2014-1318 : Ian Beer of Google Project Zero working with HP's | |
Zero Day Initiative | |
IOKit Kernel | |
Available for: OS X Mavericks v10.9.2 | |
Impact: A local user can read kernel pointers, which can be used to | |
bypass kernel address space layout randomization | |
Description: A set of kernel pointers stored in an IOKit object | |
could be retrieved from userland. This issue was addressed through | |
removing the pointers from the object. | |
CVE-ID | |
CVE-2014-1320 : Ian Beer of Google Project Zero working with HP's | |
Zero Day Initiative | |
Kernel | |
Available for: OS X Mavericks v10.9.2 | |
Impact: A local user can read a kernel pointer, which can be used to | |
bypass kernel address space layout randomization | |
Description: A kernel pointer stored in a XNU object could be | |
retrieved from userland. This issue was addressed through removing | |
the pointer from the object. | |
CVE-ID | |
CVE-2014-1322 : Ian Beer of Google Project Zero | |
Power Management | |
Available for: OS X Mavericks v10.9.2 | |
Impact: The screen might not lock | |
Description: If a key was pressed or the trackpad touched just after | |
the lid was closed, the system might have tried to wake up while | |
going to sleep, which would have caused the screen to be unlocked. | |
This issue was addressed by ignoring keypresses while going to sleep. | |
This issue does not affect systems prior to OS X Mavericks. | |
CVE-ID | |
CVE-2014-1321 : Paul Kleeberg of Stratis Health Bloomington MN, | |
Julian Sincu at the Baden-Wuerttemberg Cooperative State University | |
(DHBW Stuttgart), Gerben Wierda of R&A, Daniel Luz | |
Ruby | |
Available for: OS X Mavericks v10.9.2 | |
Impact: Running a Ruby script that handles untrusted YAML tags may | |
lead to an unexpected application termination or arbitrary code | |
execution | |
Description: An integer overflow issue existed in LibYAML's handling | |
of YAML tags. This issue was addressed through additional validation | |
of YAML tags. This issue does not affect systems prior to OS X | |
Mavericks. | |
CVE-ID | |
CVE-2013-6393 | |
Ruby | |
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, | |
OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 | |
Impact: Running a Ruby script that uses untrusted input to create a | |
Float object may lead to an unexpected application termination or | |
arbitrary code execution | |
Description: A heap-based buffer overflow issue existed in Ruby when | |
converting a string to a floating point value. This issue was | |
addressed through additional validation of floating point values. | |
CVE-ID | |
CVE-2013-4164 | |
Security - Secure Transport | |
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 | |
Impact: An attacker with a privileged network position may capture | |
data or change the operations performed in sessions protected by SSL | |
Description: In a 'triple handshake' attack, it was possible for an | |
attacker to establish two connections which had the same encryption | |
keys and handshake, insert the attacker's data in one connection, and | |
renegotiate so that the connections may be forwarded to each other. | |
To prevent attacks based on this scenario, Secure Transport was | |
changed so that, by default, a renegotiation must present the same | |
server certificate as was presented in the original connection. This | |
issue does not affect Mac OS X 10.7 systems and earlier. | |
CVE-ID | |
CVE-2014-1295 : Antoine Delignat-Lavaud, Karthikeyan Bhargavan and | |
Alfredo Pironti of Prosecco at Inria Paris | |
WindowServer | |
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 | |
Impact: Maliciously crafted applications can execute arbitrary code | |
outside the sandbox | |
Description: WindowServer sessions could be created by sandboxed | |
applications. This issue was addressed by disallowing sandboxed | |
applications from creating WindowServer sessions. | |
CVE-ID | |
CVE-2014-1314 : KeenTeam working with HP's Zero Day Initiative |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
iOS 7.1.1 is now available and addresses the following: | |
CFNetwork HTTPProtocol | |
Available for: iPhone 4 and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: An attacker in a privileged network position can obtain web | |
site credentials | |
Description: Set-Cookie HTTP headers would be processed even if the | |
connection closed before the header line was complete. An attacker | |
could strip security settings from the cookie by forcing the | |
connection to close before the security settings were sent, and then | |
obtain the value of the unprotected cookie. This issue was addressed | |
by ignoring incomplete HTTP header lines. | |
CVE-ID | |
CVE-2014-1296 : Antoine Delignat-Lavaud of Prosecco at Inria Paris | |
IOKit Kernel | |
Available for: iPhone 4 and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: A local user can read kernel pointers, which can be used to | |
bypass kernel address space layout randomization | |
Description: A set of kernel pointers stored in an IOKit object | |
could be retrieved from userland. This issue was addressed through | |
removing the pointers from the object. | |
CVE-ID | |
CVE-2014-1320 : Ian Beer of Google Project Zero working with HP's | |
Zero Day Initiative | |
Security - Secure Transport | |
Available for: iPhone 4 and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: An attacker with a privileged network position may capture | |
data or change the operations performed in sessions protected by SSL | |
Description: In a 'triple handshake' attack, it was possible for an | |
attacker to establish two connections which had the same encryption | |
keys and handshake, insert the attacker's data in one connection, and | |
renegotiate so that the connections may be forwarded to each other. | |
To prevent attacks based on this scenario, Secure Transport was | |
changed so that, by default, a renegotiation must present the same | |
server certificate as was presented in the original connection. | |
CVE-ID | |
CVE-2014-1295 : Antoine Delignat-Lavaud, Karthikeyan Bhargavan and | |
Alfredo Pironti of Prosecco at Inria Paris | |
WebKit | |
Available for: iPhone 4 and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: Visiting a maliciously crafted website may lead to an | |
unexpected application termination or arbitrary code execution | |
Description: Multiple memory corruption issues existed in WebKit. | |
These issues were addressed through improved memory handling. | |
CVE-ID | |
CVE-2013-2871 : miaubiz | |
CVE-2014-1298 : Google Chrome Security Team | |
CVE-2014-1299 : Google Chrome Security Team, Apple, Renata Hodovan of | |
University of Szeged / Samsung Electronics | |
CVE-2014-1300 : Ian Beer of Google Project Zero working with HP's | |
Zero Day Initiative | |
CVE-2014-1302 : Google Chrome Security Team, Apple | |
CVE-2014-1303 : KeenTeam working with HP's Zero Day Initiative | |
CVE-2014-1304 : Apple | |
CVE-2014-1305 : Apple | |
CVE-2014-1307 : Google Chrome Security Team | |
CVE-2014-1308 : Google Chrome Security Team | |
CVE-2014-1309 : cloudfuzzer | |
CVE-2014-1310 : Google Chrome Security Team | |
CVE-2014-1311 : Google Chrome Security Team | |
CVE-2014-1312 : Google Chrome Security Team | |
CVE-2014-1313 : Google Chrome Security Team | |
CVE-2014-1713 : VUPEN working with HP's Zero Day Initiative |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment