![]() ![]() Credit to Aaron Sigel of for reporting this issue. This issue does not affect systems prior to Mac OS X v10.6. This issue is addressed through improved validation of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. ![]() Impact: A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code executionĭescription: A format string issue exists in PackageKit's handling of distribution scripts. Mac OS X v10.6.6Īvailable for: Mac OS X v10.6 through v10.6.5, Mac OS X Server v10.6 through v10.6.5 To learn about other Security Updates, see " Apple Security Updates". ![]() Where possible, CVE IDs are used to reference the vulnerabilities for further information. To learn more about Apple Product Security, see the Apple Product Security website.įor information about the Apple Product Security PGP Key, see " How to use the Apple Product Security PGP Key." iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later. This document describes the security content of Mac OS X v10.6.6, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.įor the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. About the security content of Mac OS X v10.6.6 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |