
- #Password os x mavericks pdf
- #Password os x mavericks update
- #Password os x mavericks code
- #Password os x mavericks Bluetooth
#Password os x mavericks code
Impact: Executing a malicious application may result in arbitrary code execution within the kernelĭescription: An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional type checking. These issues were addressed through improved bounds checking.ĭescription: A null pointer dereference existed in IOCatalogue. Impact: An attacker who has arbitrary code execution on a device may be able to persist code execution across rebootsĭescription: Multiple buffer overflows existed in dyld's openSharedCacheFile() function.

These issues were addressed by updating curl to version 7.30.0 This issue was addressed by additional validation of hotkey events.ĭescription: Multiple vulnerabilities existed in curl, the most serious of which may lead to arbitrary code execution. Impact: An unprivileged application may be able to log keystrokes entered into other applications even when secure input mode is enabledĭescription: By registering for a hotkey event, an unprivileged application could log keystrokes entered into other applications even when secure input mode was enabled. This issue was addressed through improved bounds checking.ĬVE-2013-5170 : Will Dormann of the CERT/CC
#Password os x mavericks pdf
Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code executionĭescription: A buffer underflow existed in the handling of PDF files. The issue is addressed through improved handling of display sleep. Impact: Windows may be visible over the lock screen after display sleepĭescription: A logic issue existed in CoreGraphics's handling of display sleep mode, resulting in data corruption that could result in windows being visible over the lock screen. Rather than opening the URL, Console will now preview the URL with Quick Look.
#Password os x mavericks update
Impact: Clicking on a malicious log entry may lead to unexpected application executionĭescription: This update modified the behavior of Console when clicking on a log entry with an attached URL. This issue was addressed by enabling TLS 1.2. If the same connection was attempted repeatedly the attacker may eventually have been able to decrypt the data being sent, such as a password. A man-in-the-middle attacker could have injected invalid data, causing the connection to close but revealing some information about the previous data. These versions are subject to a protocol weakness when using block ciphers. Impact: An attacker could decrypt part of a SSL connectionĭescription: Only the SSLv3 and TLS 1.0 versions of SSL were used.

This issue was addressed through improved handling of session cookies.ĬVE-2013-5167 : Graham Bennett, Rob Ansaldo of Amherst College Impact: Session cookies may persist even after resetting Safariĭescription: Resetting Safari did not always delete session cookies until Safari was closed.

This issue was addressed by retaining the interface until it is no longer needed.ĬVE-2013-5166 : Stefano Bianchi Mazzone, Mattia Pagnozzi, and Aristide Fattori of Computer and Network Security Lab (LaSER), Università degli Studi di Milano
#Password os x mavericks Bluetooth
Impact: A malicious local application could cause an unexpected system terminationĭescription: The Bluetooth USB host controller deleted interfaces needed for later operations. This issue was addressed by disallowing sandboxed applications from specifying arguments.ĬVE-2013-5179 : Friedrich Graeter of The Soulmen GbR A compromised sandboxed application could abuse this to bypass the sandbox. This issue was addressed through improved handling of the -blockApp options.ĬVE-2013-5165 : Alexander Frangis of PopCap Gamesĭescription: The LaunchServices interface for launching an application allowed sandboxed apps to specify the list of arguments passed to the new process. Impact: socketfilterfw -blockApp may not block applications from receiving network connectionsĭescription: The socketfilterfw command line tool's -blockApp option did not properly block applications from receiving network connections.
