A bug in security could result in a revoked certificate to be trusted.Īpple also addressed a couple of issues in FreeRADIUS by updating it to version 2.2.10. Macos server high sierra code#Other vulnerabilities could allow an attacker to impersonate a service or cause denial of service, an application to execute arbitrary code with kernel privileges, or the sender of an email to determine the IP address of the recipient. IOFireWireFamily bugs could allow attackers to execute arbitrary code, or applications to read restricted memory. An issue impacting Captive Network Assistant could result in a local user unknowingly sending a password unencrypted over the network.Ī CoreAudio bug allowed an application to read restricted memory, while an issue in Directory Utility could allow a local attacker to determine the Apple ID of the owner of the computer. Apple also addressed 4 bugs in zlib by updating it to version 1.2.11.Ī flaw in AppSandbox could result in an application causing denial of service, while a bug in CFNetwork Proxies could allow an attacker in a privileged network position to cause a denial of service. These issues were addressed by updating to ntp version 4.2.8p10, file version 5.30, and SQLite version 3.19.3. With 10 vulnerabilities addressed in it, ntp emerges as the most affected component, followed by file, with 6 security flaws, and SQLite with 5 vulnerabilities. Affected components include Application Firewall, AppSandbox, Captive Network Assistant, CoreAudio, Directory Utility, file, IOFireWireFamily, Kernel, libc, libexpat, Mail, ntp, Screen Lock, Security, SQLite, and zlib. The tech company addressed over 40 security flaws impacting OS X Lion 10.8 and later. Apple on Monday announced the release of security patches for its macOS users, available as part of the macOS High Sierra 10.13 platform upgrade.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |