Find Here updated guides about Professional certification, trade certification, or professional designation, Microsoft certification, CCNA, CISCO Exams certification.
Thursday, 16 May 2013
Thursday, 9 May 2013
About the security content of Apple TV 5.2.1
Learn more about the security content of Apple TV 5.2.1.
Products AffectedProduct Security
Apple TV 5.2.1Apple TV
Available for: Apple TV 2nd generation and later
Impact: A local user may be able to execute unsigned code
Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed by refusing to load an executable with overlapping segments.
CVE-ID
CVE-2013-0977 : evad3rs
Apple TV
Available for: Apple TV 2nd generation and later
Impact: A local user may be able to determine the address of structures in the kernel
Description: An information disclosure issue existed in the ARM prefetch abort handler. This issue was addressed by panicking if the prefetch abort handler is not being called from an abort context.
CVE-ID
CVE-2013-0978 : evad3rs
Apple TV
Available for: Apple TV 2nd generation and later
Impact: A local user may be able to execute arbitrary code in the kernel
Description: The IOUSBDeviceFamily driver used pipe object pointers that came from userspace. This issue was addressed by performing additional validation of pipe object pointers.
CVE-ID
CVE-2013-0981 : evad3rs
$('articlecontent').select('img').each(function(element) { if(element.width > 640 ){ var imageDiv = document.createElement('div'); imageDiv.setStyle({ 'display':'block', 'width':'660px', 'overflow':'auto', 'border':'1px solid #dedede','margin-right': '15px'}); element.parentNode.replaceChild(imageDiv, element); imageDiv.appendChild(element); } }); $('articlecontent').select('table').each(function(element) { if(element.width > 660 || element.offsetWidth>660){ var tableDiv = document.createElement('div'); tableDiv.setAttribute("class","kbtablecontainer"); element.setAttribute("style","margin-bottom:0px !important"); element.parentNode.replaceChild(tableDiv, element); tableDiv.appendChild(element); } }); Rate this article:Not helpfulSomewhat helpfulHelpfulVery helpfulSolved my problemOne Moment PleaseThanks for rating this article Not helpful Somewhat helpful Helpful Very helpful Solved my problem

About the security content of iTunes 10.6.3
This document describes the security content of iTunes 10.6.3.
Products AffectedProduct Security, iTunes 10
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates".
iTunes 10.6.3iTunes
Available for: Mac OS X v10.5.8 or later, Windows 7, Vista, XP SP2 or later
Impact: Importing a maliciously crafted .m3u playlist may lead to an unexpected application termination or arbitrary code execution
Description: A heap buffer overflow existed in the handling of .m3u playlists.
CVE-ID
CVE-2012-0677 : Gjoko Krstic of Zero Science Lab
WebKit
Available for: Windows 7, Vista, XP SP2 or later
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in WebKit.
CVE-ID
CVE-2012-0672 : Adam Barth and Abhishek Arya of the Google Chrome Security Team
$('articlecontent').select('img').each(function(element) { if(element.width > 640 ){ var imageDiv = document.createElement('div'); imageDiv.setStyle({ 'display':'block', 'width':'660px', 'overflow':'auto', 'border':'1px solid #dedede','margin-right': '15px'}); element.parentNode.replaceChild(imageDiv, element); imageDiv.appendChild(element); } }); $('articlecontent').select('table').each(function(element) { if(element.width > 660 || element.offsetWidth>660){ var tableDiv = document.createElement('div'); tableDiv.setAttribute("class","kbtablecontainer"); element.setAttribute("style","margin-bottom:0px !important"); element.parentNode.replaceChild(tableDiv, element); tableDiv.appendChild(element); } }); Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information. Rate this article:Not helpfulSomewhat helpfulHelpfulVery helpfulSolved my problemOne Moment PleaseThanks for rating this article Not helpful Somewhat helpful Helpful Very helpful Solved my problem View the original article hereAbout the security content of iTunes 10.7
WebKit
Available for: Windows 7, Vista, XP SP2 or later
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit. These issues are addressed through improved memory handling.
CVE-ID
CVE-2011-3016 : miaubiz
CVE-2011-3021 : Arthur Gerkis
CVE-2011-3027 : miaubiz
CVE-2011-3032 : Arthur Gerkis
CVE-2011-3034 : Arthur Gerkis
CVE-2011-3035 : wushi of team509 working with iDefense VCP, Arthur Gerkis
CVE-2011-3036 : miaubiz
CVE-2011-3037 : miaubiz
CVE-2011-3038 : miaubiz
CVE-2011-3039 : miaubiz
CVE-2011-3040 : miaubiz
CVE-2011-3041 : miaubiz
CVE-2011-3042 : miaubiz
CVE-2011-3043 : miaubiz
CVE-2011-3044 : Arthur Gerkis
CVE-2011-3050 : miaubiz
CVE-2011-3053 : miaubiz
CVE-2011-3059 : Arthur Gerkis
CVE-2011-3060 : miaubiz
CVE-2011-3064 : Atte Kettunen of OUSPG
CVE-2011-3068 : miaubiz
CVE-2011-3069 : miaubiz
CVE-2011-3071 : pa_kt working with HP's Zero Day Initiative
CVE-2011-3073 : Arthur Gerkis
CVE-2011-3074 : Slawomir Blazek
CVE-2011-3075 : miaubiz
CVE-2011-3076 : miaubiz
CVE-2011-3078 : Martin Barbella of the Google Chrome Security Team
CVE-2011-3081 : miaubiz
CVE-2011-3086 : Arthur Gerkis
CVE-2011-3089 : Skylined of the Google Chrome Security Team, miaubiz
CVE-2011-3090 : Arthur Gerkis
CVE-2011-3105 : miaubiz
CVE-2011-3913 : Arthur Gerkis
CVE-2011-3924 : Arthur Gerkis
CVE-2011-3926 : Arthur Gerkis
CVE-2011-3958 : miaubiz
CVE-2011-3966 : Aki Helin of OUSPG
CVE-2011-3968 : Arthur Gerkis
CVE-2011-3969 : Arthur Gerkis
CVE-2011-3971 : Arthur Gerkis
CVE-2012-0682 : Apple Product Security
CVE-2012-0683 : Dave Mandelin of Mozilla
CVE-2012-1520 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP
CVE-2012-1521 : Skylined of the Google Chrome Security Team, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP
CVE-2012-2817 : miaubiz
CVE-2012-2818 : miaubiz
CVE-2012-2829 : miaubiz
CVE-2012-2831 : miaubiz
CVE-2012-2842 : miaubiz
CVE-2012-2843 : miaubiz
CVE-2012-3589 : Dave Mandelin of Mozilla
CVE-2012-3590 : Apple Product Security
CVE-2012-3591 : Apple Product Security
CVE-2012-3592 : Apple Product Security
CVE-2012-3593 : Apple Product Security
CVE-2012-3594 : miaubiz
CVE-2012-3595 : Martin Barbella of Google Chrome Security
CVE-2012-3596 : Skylined of the Google Chrome Security Team
CVE-2012-3597 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer
CVE-2012-3598 : Apple Product Security
CVE-2012-3599 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer
CVE-2012-3600 : David Levin of the Chromium development community
CVE-2012-3601 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3602 : miaubiz
CVE-2012-3603 : Apple Product Security
CVE-2012-3604 : Skylined of the Google Chrome Security Team
CVE-2012-3605 : Cris Neckar of the Google Chrome Security team
CVE-2012-3606 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3607 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3608 : Skylined of the Google Chrome Security Team
CVE-2012-3609 : Skylined of the Google Chrome Security Team
CVE-2012-3610 : Skylined of the Google Chrome Security Team
CVE-2012-3611 : Apple Product Security
CVE-2012-3612 : Skylined of the Google Chrome Security Team
CVE-2012-3613 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3614 : Yong Li of Research In Motion, Inc.
CVE-2012-3615 : Stephen Chenney of the Chromium development community
CVE-2012-3616 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3617 : Apple Product Security
CVE-2012-3618 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer
CVE-2012-3620 : Abhishek Arya of Google Chrome Security Team
CVE-2012-3621 : Skylined of the Google Chrome Security Team
CVE-2012-3622 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3623 : Skylined of the Google Chrome Security Team
CVE-2012-3624 : Skylined of the Google Chrome Security Team
CVE-2012-3625 : Skylined of Google Chrome Security Team
CVE-2012-3626 : Apple Product Security
CVE-2012-3627 : Skylined and Abhishek Arya of Google Chrome Security team
CVE-2012-3628 : Apple Product Security
CVE-2012-3629 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer
CVE-2012-3630 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer
CVE-2012-3631 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer
CVE-2012-3632 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3633 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3634 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3635 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3636 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3637 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3638 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3639 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3640 : miaubiz
CVE-2012-3641 : Slawomir Blazek
CVE-2012-3642 : miaubiz
CVE-2012-3643 : Skylined of the Google Chrome Security Team
CVE-2012-3644 : miaubiz
CVE-2012-3645 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3646 : Julien Chaffraix of the Chromium development community, Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3647 : Skylined of the Google Chrome Security Team
CVE-2012-3648 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3649 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team
CVE-2012-3651 : Abhishek Arya and Martin Barbella of the Google Chrome Security Team
CVE-2012-3652 : Martin Barbella of Google Chrome Security Team
CVE-2012-3653 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3654 : Skylined of the Google Chrome Security Team
CVE-2012-3655 : Skylined of the Google Chrome Security Team
CVE-2012-3656 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer
CVE-2012-3657 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3658 : Apple
CVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3660 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3661 : Apple Product Security
CVE-2012-3663 : Skylined of Google Chrome Security Team
CVE-2012-3664 : Thomas Sepez of the Chromium development community
CVE-2012-3665 : Martin Barbella of Google Chrome Security Team using AddressSanitizer
CVE-2012-3666 : Apple
CVE-2012-3667 : Trevor Squires of propaneapp.com
CVE-2012-3668 : Apple Product Security
CVE-2012-3669 : Apple Product Security
CVE-2012-3670 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer, Arthur Gerkis
CVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome Security Team
CVE-2012-3672 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3673 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3674 : Skylined of Google Chrome Security Team
CVE-2012-3675 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3676 : Julien Chaffraix of the Chromium development community
CVE-2012-3677 : Apple
CVE-2012-3678 : Apple Product Security
CVE-2012-3679 : Chris Leary of Mozilla
CVE-2012-3680 : Skylined of Google Chrome Security Team
CVE-2012-3681 : Apple
CVE-2012-3682 : Adam Barth of the Google Chrome Security Team
CVE-2012-3683 : wushi of team509 working with iDefense VCP
CVE-2012-3684 : kuzzcc
CVE-2012-3685 : Apple Product Security
CVE-2012-3686 : Robin Cao of Torch Mobile (Beijing)
CVE-2012-3687 : kuzzcc
CVE-2012-3688 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3692 : Skylined of the Google Chrome Security Team, Apple Product Security
CVE-2012-3699 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3700 : Apple Product Security
CVE-2012-3701 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3702 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3703 : Apple Product Security
CVE-2012-3704 : Skylined of the Google Chrome Security Team
CVE-2012-3705 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3706 : Apple Product Security
CVE-2012-3707 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
CVE-2012-3708 : Apple
CVE-2012-3709 : Apple Product Security
CVE-2012-3710 : James Robinson of Google
CVE-2012-3711 : Skylined of the Google Chrome Security Team
CVE-2012-3712 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer
About the security content of Apple TV 5.1.1
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see Apple Security Updates.
">ACUtil.setPOD('us~en'); var articleId = "HT5598"; var ACStaticText = { 'more': '…more', 'less': 'less' };KmLoader.akamaiUrl = 'http://km.support.apple.com';//function sendRead()var locale = 'en_US';Event.observe(window, 'load', function() {ACHistory.addKbView('HT5598', 'About the security content of Apple TV 5.1.1', 'en_US', 'unknown');ACUtil.getMultipleOffers('133077,133607,PP23', 'HOWTO_ARTICLES', 'en_US', 'false');ACUtil.reportView('HT5598', 'en_US');// Apple Instant Feed statistics code if(enableAppleInstant == "yes"){var store = new Persist.Store('FeedStats');if (store.get('resultActivity')=='true'){var time = new Date();// Fix for /*setReadTimer = setTimeout(function(){var feedStats = new ACFeedStatistics();feedStats.updateRead('HT5598', store.get('position'));store.remove('HT5598');store.remove('position');}, 3000);*///store.set('HT5598', time.getTime());store.set('timeStart', time.getTime());}} });Event.observe(window, 'beforeunload', function(){// Apple Instant Feed statistics code if(enableAppleInstant == "yes"){ var store = new Persist.Store('FeedStats'); if (store.get('resultActivity')=='true' && store.get('timeStart') !== null){ var time = new Date();//var timeDiff = time.getTime() - store.get('HT5598');var timeDiff = time.getTime() - store.get('timeStart');var timeSpent = Math.floor(timeDiff/1000);var feedStats = new ACFeedStatistics();// Fix for if (timeDiff About the security content of Apple TV 5.1.1 SummaryThis document describes the security content of Apple TV 5.1.1.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see Apple Security Updates.
Products AffectedApple TV (2nd generation), Apple TV (3rd generation), Product Security
Apple TV 5.1.1Apple TV
Available for: Apple TV 2nd generation and later
Impact: Compromised applications may be able to determine addresses in the kernel
Description: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing a OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them.
CVE-ID
CVE-2012-3749 : Mark Dowd of Azimuth Security, Eric Monti of Square, and additional anonymous researchers
Apple TV
Available for: Apple TV 2nd generation and later
Impact: An attacker with a privileged network position may cause an unexpected application termination or arbitrary code execution
Description: A time of check to time of use issue existed in the handling of JavaScript arrays. This issue was addressed through additional validation of JavaScript arrays.
CVE-ID
CVE-2012-3748 : Joost Pol and Daan Keuper of Certified Secure working with HP TippingPoint's Zero Day Initiative
$('articlecontent').select('img').each(function(element) { if(element.width > 640 ){ var imageDiv = document.createElement('div'); imageDiv.setStyle({ 'display':'block', 'width':'660px', 'overflow':'auto', 'border':'1px solid #dedede','margin-right': '15px'}); element.parentNode.replaceChild(imageDiv, element); imageDiv.appendChild(element); } }); $('articlecontent').select('table').each(function(element) { if(element.width > 660 || element.offsetWidth>660){ var tableDiv = document.createElement('div'); tableDiv.setAttribute("class","kbtablecontainer"); element.setAttribute("style","margin-bottom:0px !important"); element.parentNode.replaceChild(tableDiv, element); tableDiv.appendChild(element); } }); Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information. Rate this article:Not helpfulSomewhat helpfulHelpfulVery helpfulSolved my problemOne Moment PleaseThanks for rating this article Not helpful Somewhat helpful Helpful Very helpful Solved my problem



(659 Responses) LanguagesDanskDeutschEnglishEspañolFrançaisItalianoNederlandsNorsk BokmålPolskiPortuguês (Brasil)PortuguêsSvenska KmLoader.isOmnitureSupported='true'; Event.observe(window, 'load', function() { new KmLoader('2', 0, 0, 'About the security content of Apple TV 5.1.1', 0, 0, 'en_US', 0, 0, 'support_site.related_articles.HT5598',undefined,undefined,'HT5598');}); Event.observe(window, 'load', function() { new KmLoader('1', 0, 0, 'About the security content of Apple TV 5.1.1', 0, 0, 'en_US', 0, 0, 'support_site.related_discussions.HT5598'); }); Related Discussions More discussions Related Articles Ask other users about this articlein Apple Support Communities Wait...

About the security content of Safari 6.0.4
This document describes the security content of Safari 6.0.4, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.
Products AffectedProduct Security
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates".
WebKit
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.3
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: An invalid cast issue existed in the handling of SVG files. This issue was addressed through improved type checking.
CVE-ID
CVE-2013-0912 : Nils and Jon from MWR Labs working with HP TippingPoint's Zero Day Initiative
$('articlecontent').select('img').each(function(element) { if(element.width > 640 ){ var imageDiv = document.createElement('div'); imageDiv.setStyle({ 'display':'block', 'width':'660px', 'overflow':'auto', 'border':'1px solid #dedede','margin-right': '15px'}); element.parentNode.replaceChild(imageDiv, element); imageDiv.appendChild(element); } }); $('articlecontent').select('table').each(function(element) { if(element.width > 660 || element.offsetWidth>660){ var tableDiv = document.createElement('div'); tableDiv.setAttribute("class","kbtablecontainer"); element.setAttribute("style","margin-bottom:0px !important"); element.parentNode.replaceChild(tableDiv, element); tableDiv.appendChild(element); } }); Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information. Rate this article:Not helpfulSomewhat helpfulHelpfulVery helpfulSolved my problemOne Moment PleaseThanks for rating this article Not helpful Somewhat helpful Helpful Very helpful Solved my problem



(66 Responses) LanguagesCeštinaDanskDeutschEnglishEspañolSuomiFrançaisMagyarBahasa IndonesiaItaliano??????NederlandsNorsk BokmålPolskiPortuguês (Brasil)PortuguêsP??????Svenska???Türkçe???????? KmLoader.isOmnitureSupported='true'; Event.observe(window, 'load', function() { new KmLoader('2', 0, 0, 'About the security content of Safari 6.0.4', 0, 0, 'en_US', 0, 0, 'support_site.related_articles.HT5701',undefined,undefined,'HT5701');}); Event.observe(window, 'load', function() { new KmLoader('1', 0, 0, 'About the security content of Safari 6.0.4', 0, 0, 'en_US', 0, 0, 'support_site.related_discussions.HT5701'); }); Related Discussions More discussions Related Articles Ask other users about this articlein Apple Support Communities Wait...

About the security content of iOS 6.1 Software Update
Product Security, iPad, iPhone, iPod touch
iOS 6.1Identity Services
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Authentication relying on certificate-based Apple ID authentication may be bypassed
Description: An error handling issue existed in Identity Services. If the user's AppleID certificate failed to validate, the user's AppleID was assumed to be the empty string. If multiple systems belonging to different users enter this state, applications relying on this identity determination may erroneously extend trust. This issue was addressed by ensuring that NULL is returned instead of an empty string.
CVE-ID
CVE-2013-0963
International Components for Unicode
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack
Description: A canonicalization issue existed in the handling of the EUC-JP encoding, which could lead to a cross-site scripting attack on EUC-JP encoded websites. This issue was addressed by updating the EUC-JP mapping table.
CVE-ID
CVE-2011-3058 : Masato Kinugawa
Kernel
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: A user-mode process may be able to access the first page of kernel memory
Description: The iOS kernel has checks to validate that the user-mode pointer and length passed to the copyin and copyout functions would not result in a user-mode process being able to directly access kernel memory. The checks were not being used if the length was smaller than one page. This issue was addressed through additional validation of the arguments to copyin and copyout.
CVE-ID
CVE-2013-0964 : Mark Dowd of Azimuth Security
Security
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information
Description: Several intermediate CA certificates were mistakenly issued by TURKTRUST. This may allow a man-in-the-middle attacker to redirect connections and intercept user credentials or other sensitive information. This issue was addressed by not allowing the incorrect SSL certificates.
StoreKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: JavaScript may be enabled in Mobile Safari without user interaction
Description: If a user disabled JavaScript in Safari Preferences, visiting a site which displayed a Smart App Banner would re-enable JavaScript without warning the user. This issue was addressed by not enabling JavaScript when visiting a site with a Smart App Banner.
CVE-ID
CVE-2013-0974 : Andrew Plotkin of Zarfhome Software Consulting, Ben Madison of BitCloud, Marek Durcek
WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.
CVE-ID
CVE-2012-2857 : Arthur Gerkis
CVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2012-3621 : Skylined of the Google Chrome Security Team
CVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2012-3687 : kuzzcc
CVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0948 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0949 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0950 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0951 : Apple
CVE-2013-0952 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team
CVE-2013-0955 : Apple
CVE-2013-0956 : Apple Product Security
CVE-2012-2824 : miaubiz
CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0968 : Aaron Nelson
WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Copying and pasting content on a malicious website may lead to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of content pasted from a different origin. This issue was addressed through additional validation of pasted content.
CVE-ID
CVE-2013-0962 : Mario Heiderich of Cure53
WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of frame elements. This issue was addressed through improved origin tracking.
CVE-ID
CVE-2012-2889 : Sergey Glazunov
WiFi
Available for: iPhone 3GS, iPhone 4, iPod touch (4th generation), iPad 2
Impact: A remote attacker on the same WiFi network may be able to temporarily disable WiFi
Description: An out of bounds read issue exists in Broadcom's BCM4325 and BCM4329 firmware's handling of 802.11i information elements. This issue was addressed through additional validation of 802.11i information elements.
CVE-ID
CVE-2012-2619 : Andres Blanco and Matias Eissler of Core Security
$('articlecontent').select('img').each(function(element) { if(element.width > 640 ){ var imageDiv = document.createElement('div'); imageDiv.setStyle({ 'display':'block', 'width':'660px', 'overflow':'auto', 'border':'1px solid #dedede','margin-right': '15px'}); element.parentNode.replaceChild(imageDiv, element); imageDiv.appendChild(element); } }); $('articlecontent').select('table').each(function(element) { if(element.width > 660 || element.offsetWidth>660){ var tableDiv = document.createElement('div'); tableDiv.setAttribute("class","kbtablecontainer"); element.setAttribute("style","margin-bottom:0px !important"); element.parentNode.replaceChild(tableDiv, element); tableDiv.appendChild(element); } }); Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information. Rate this article:Not helpfulSomewhat helpfulHelpfulVery helpfulSolved my problemOne Moment PleaseThanks for rating this article Not helpful Somewhat helpful Helpful Very helpful Solved my problem

