CERT mailing list archives

Current Activity - Apple Releases Security Updates for Safari


From: Current Activity <us-cert () us-cert gov>
Date: Thu, 18 Apr 2013 15:46:48 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System
Apple Releases Security Updates for Safari


Original release date: April 18, 2013

Apple has released security updates for Safari 6.0.4 WebKit to address
multiple vulnerabilities. These vulnerabilities could allow a remote
attacker to execute arbitrary code or cause a denial-of-service
condition.

Safari 6.0.4 WebKit updates are available for the following versions:
 * OS X Lion v10.7.5
 * OS X Lion Server v10.7.5
 * OS X Mountain Lion v10.8.3

US-CERT encourages users and administrators to review Apple Support
Article HT5701 and follow best-practice security policies to determine
if their organization is affected and the appropriate response.

Relevant URL(s):
<http://support.apple.com/kb/HT5701>

____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification/

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/ncas/current-activity/2013/04/18/Apple-Releases-Security-Updates-Safari

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/mailing-lists-and-feeds/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUXBNjHdnhE8Qi3ZhAQLA6wf8DdaliMk+wwoJiMSvFMNw5YbA54zd83FB
XR33m89F0eaJvx7SJ6tKa1lvkB4i41JcCw0ucGoYWuPbGiXXfnP3OMEOsvTbfC65
6ODkRPgBjEAYL3SAK47ZfGFyZ7W0/TZn87eY4atWbP418yZrksl6qE1+ekm13KJH
06Anf+LQbDgtL2pvKDkl/XbBn4eO/2wdiDc8lt7nhQJYBug/6AXRIKeO4xuE8g7f
U+7Giwi9nzMvSKsuL/+YhJOUksUZwrsIVP4lztWYK8vYKDZ0grgAfJHENvClcsYq
s8/ZoeGiaqJDu0hwoMzWfzktxhLtukNAMyUqEZ/UJ9q+/irSDKZZFw==
=RR46
-----END PGP SIGNATURE-----


Current thread: