![]() ![]() ATS - Multiple buffer overflows exist in Apple Type Services' handling of embedded fonts.Apache Portable Runtime - Multiple integer overflows in Apache Portable Runtime (apr) may lead to an unexpected application termination or arbitrary code execution. ![]() A separate patch corrects a flaw that allows an attacker to use the TRACE HTTP method in the Apache Web server to conduct cross-site scripting attacks through certain web client software. Apache - Apache is updated to version 2.2.13 to address several vulnerabilities, the most serious of which may lead to privilege escalation.Connecting to a malicious AFP Server may cause an unexpected system termination or arbitrary code execution with system privileges. AFP Client - Multiple memory corruption issues exist in AFP Client.Here's a glimpse of some of the more serious issues covered in the Security Update 2009-006/Mac OS X v10.6.2 patch bundle: ![]() It includes patches for open-source components like Apache and PHP and security holes in the QuickTime media player. The majority of the flaws could allow a remote attacker to gain complete control of an unpatched system, meaning that this update carries an "extremely critical rating." White House: Brace for potential Russian cyberattacksĤ1 impressive questions to ask in a job interviewĪpple has dropped another mega-patch to cover a total of 58 documented vulnerabilities affecting the Mac OS X ecosystem. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |