Thursday, March 28, 2024
Search
English
Optical Storage
Graphics Cards
General Computing
PC Parts
Digital Cameras
Consumer Electronics
Games
Mobiles
All News Categories
Older News
Optical Storage
Graphics Cards
General Computing
PC Parts
Digital Cameras
Consumer Electronics
Games
Cooling Systems
Mobiles
Software Reviews
Reviews Around the Web
Technology Previews
Essays
Interviews
Tech Views
Glossary
FAQ
Guides/How-To's
Firmware
Drivers
BIOS
Software
Media Tests
Drive Comparisons
DVD Media Formats
All Forums
Become Member
Today's Posts
Popular Topics
In-House
Optical Storage
Optical Storage Software
General
Consumer Electronics
Other
News Around The Web
Advertise
Links
Jobs
Site Map
News/Reviews Feed
Submit News
Polls
Competitions
Users' Privacy
Contact Us
About
Home
|
News
|
Reviews
|
Articles
|
Guides
|
Download
|
Expert Area
|
Forum
|
Site Info
Wednesday, June 16, 2010
Mac OS X Updated to v10.6.4
You are sending an email that contains the article
and a private message for your recipient(s).
Your Name:
Your e-mail:
* Required!
Recipient (e-mail):
*
Subject:
*
Introductory Message:
HTML/Text
(Photo: Yes/No)
(At the moment, only Text is allowed...)
Message Text:
Apple has released a security update for the Mac OS X operating system.
The Mac OS X v10.6.4 can be downloaded and installed via Software Update preferences, or from
Apple Downloads
. The patch is available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.3, Mac OS X Server v10.6 through v10.6.3
The security update patches many issues including:
- CUPS: Visiting a maliciously crafted website while logged into the CUPS web interface as an administrator may allow CUPS settings to be changed
- CUPS: A remote attacker may cause an unexpected application termination of cupsd
- CUPS: An attacker with access to the CUPS web interface may be able to read a limited amount of memory from the cupsd process
- DesktopServices: A Finder operation may result in files or folders with unexpected permissions
- Flash Player plug-in: Multiple vulnerabilities in Adobe Flash Player plug-in
- Folder Manager: Unmounting a maliciously crafted disk image or remote share may lead to data loss
- Help Viewer: Visiting a maliciously crafted website may lead to the execution of JavaScript in the local domain
- iChat: A remote user may upload files to arbitrary locations on the filesystem of a user currently using AIM in iChat
- ImageIO: Opening a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution
- ImageIO: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Kerberos: An unauthenticated remote user may cause an unexpected termination of the KDC process, or arbitrary code execution
- Kerberos: A remote user may cause an unexpected termination of the KDC process, or arbitrary code execution
- Kerberos: An unauthenticated remote user may cause an unexpected termination of the KDC process
- Using libcurl to download files from a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
- libcurl: A local user may obtain system privileges
- Network Authorization: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
- Network Authorization: A man-in-the-middle attacker may be able to impersonate a network account server
- Open Directory: Network devices may disable printing in certain applications
- Printer Setup: A user with access to the printer may cause an unexpected application termination or arbitrary code execution
- Ruby: A remote attacker may gain access to accounts served by Ruby WEBrick
- SMB File Server: A remote user may obtain unauthorized access to arbitrary files
- SquirrelMail: Multiple vulnerabilities in SquirrelMail
- Wiki Server: Viewing maliciously crafted Wiki content may result in a cross-site scripting attack
Home
|
News
|
All News
|
Reviews
|
Articles
|
Guides
|
Download
|
Expert Area
|
Forum
|
Site Info
Site best viewed at 1024x768+ -
CDRINFO.COM
1998-2024 - All rights reserved
-
Privacy policy
-
Contact Us
.