[Breves] Apple Safari 8.05, 7.1.5 y 6.2.5 (Actualizaciones de Seguridad)

Posted by Destroyer on abril 08, 2015
Programas

Apple ha puesto a disposición de los usuarios las versiones 8.0.5, 7.1.5 y 6.2.5 de su navegador Safari. Están disponibles desde la Mac App Store y para OS X Mountain Lion 10.8.5, Mavericks 10.9.5 y Yosemite 10.10.2.

Solventan bugs relacionados con la navegación privada y el historial que se almacena en el navegador, el borrado del historial, su motor Webkit, certificados, etc.

A continuación, la información técnica que proporciona Apple:

APPLE-SA-2015-04-08-1 Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5

Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 are now available and
address the following:

Safari
Available for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
and OS X Yosemite v10.10.2
Impact:  Users may be tracked by malicious websites using client
certificates
Description:  An issue existed in Safari's client certificate
matching for SSL authentication. This issue was addressed by improved
matching of valid client certificates.
CVE-ID
CVE-2015-1129 : Stefan Kraus of fluid Operations AG, Sylvain Munaut
of Whatever s.a.

Safari
Available for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
and OS X Yosemite v10.10.2
Impact:  Notifications preferences may reveal users' browsing history
in private browsing mode
Description:  Responding to push notification requests in private
browsing mode revealed users' browsing history. This issue was
addressed by disabling push notification prompts in private browsing
mode.
CVE-ID
CVE-2015-1128 : Joseph Winn of Credit Union Geek

Safari
Available for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
and OS X Yosemite v10.10.2
Impact:  Users' browsing history may not be completely purged
Description:  A state management issue existed in Safari that
resulted in users' browsing history not being purged from
history.plist. This issue was addressed by improved state management.
CVE-ID
CVE-2015-1112 : William Breuer, The Netherlands

WebKit
Available for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
and OS X Yosemite v10.10.2
Impact:  Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description:  Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-1119 : Renata Hodovan of University of Szeged / Samsung
Electronics
CVE-2015-1120 : Apple
CVE-2015-1121 : Apple
CVE-2015-1122 : Apple
CVE-2015-1124 : Apple

WebKit
Available for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
and OS X Yosemite v10.10.2
Impact:  Users' browsing history in private mode may be indexed
Description:  A state management issue existed in Safari that
inadvertently indexed users' browsing history when in private
browsing mode. This issue was addressed by improved state management.
CVE-ID
CVE-2015-1127 : Tyler C

WebKit
Available for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
and OS X Yosemite v10.10.2
Impact:  Visiting a maliciously crafted website may lead to resources
of another origin being accessed
Description:  An issue existed in WebKit's credential handling for
FTP URLs. This issue was addressed by improved URL decoding.
CVE-ID
CVE-2015-1126 : Jouko Pynnonen of Klikki Oy

Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 may be obtained from
the Mac App Store.

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

Tags: , , , , , , , , , , , ,

Comments are closed.

Sentimos molestarte con lo de las Cookies, pero es por imperativo legal. Puedes ver aquí la Política de Cookies, si continúas navegando te informo que la estás aceptando ;)    Ver
Privacidad