Back to Blog
Beats updater macos 10.125/16/2023 ![]() This was addressed with improved credential validation. Impact: An attacker may be able to bypass administrator authentication without supplying the administrator’s passwordĭescription: A logic error existed in the validation of credentials. Not impacted: macOS Sierra 10.12.6 and earlier This issue was addressed with improved bounds checking.Īvailable for: macOS High Sierra 10.13 and macOS High Sierra 10.13.1 Impact: Malicious FTP servers may be able to cause the client to read out-of-bounds memoryĭescription: An out-of-bounds read issue existed in the FTP PWD response parsing. Impact: Processing a maliciously crafted Apache configuration directive may result in the disclosure of process memoryĭescription: Multiple issues were addressed by updating to version 2.4.28. MacOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El CapitanĪvailable for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Multiple security relates patches and bug fixes have also been included for the software updates, according to security notes from Apple: ![]() Security Notes for macOS 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan
0 Comments
Read More
Leave a Reply. |