Alert GCSA-11080 - Apple Mac OS X aggiornamento per Java
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
**********************************************************************
Alert ID : GCSA-11080
Data : 9 Novembre 2011
Titolo : Apple Mac OS X aggiornamento per Java
**********************************************************************
:: Descrizione del problema:
Apple ha rilasciato un aggiornamento per Java per Mac OS X.
Tale aggiornamento risolve alcune vulnerabilita' che potrebbero essere
sfruttate da un utente malevolo per rivelare informazioni e da un attaccante
per rivelare informazioni potenzialmente sensibili, dirottare sessioni utente,
condurre attacchi di tipo DNS poisoning, manipolare dati, provocare DoS e
compromettere un sistema vulnerabile.
:: Piattaforme e Software interessati:
Apple Macintosh OS X
:: Impatto:
DoS
Spoofing
Manipolazione di dati
Hijacking
Esposizione di informazioni sensibili
Accesso al sistema
:: Soluzione:
Applicare l'aggiornamento:
http://www.apple.com/support/downloads/
:: Riferimenti:
Apple:
http://support.apple.com/kb/HT5045
Secunia:
http://secunia.com/advisories/46774/
Mitre CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3521
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3544
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3545
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3546
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3549
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3551
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3552
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3554
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3556
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3558
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3561
-----BEGIN PGP SIGNATURE-----
iQCVAwUBTrqGSvOB+SpikaiRAQJpkwQAulErpDhK8bt0FMKxxyjbcvHHqjIVh/FI
Ld/KMOn98h4/ibV5QY4AffJ2rKLZ2c1TvSSc2+wEJwtMiC9XMMxRjWMhxBAHWC5u
u/oziGpmmIjf4VD7HE39VK2fN+VaJIlS8DPlSQEA/m2wc28UPtVgoMWyEcLmwCe1
bZXfM5oSlXs=
=WNbD
-----END PGP SIGNATURE-----
Hash: SHA1
**********************************************************************
Alert ID : GCSA-11080
Data : 9 Novembre 2011
Titolo : Apple Mac OS X aggiornamento per Java
**********************************************************************
:: Descrizione del problema:
Apple ha rilasciato un aggiornamento per Java per Mac OS X.
Tale aggiornamento risolve alcune vulnerabilita' che potrebbero essere
sfruttate da un utente malevolo per rivelare informazioni e da un attaccante
per rivelare informazioni potenzialmente sensibili, dirottare sessioni utente,
condurre attacchi di tipo DNS poisoning, manipolare dati, provocare DoS e
compromettere un sistema vulnerabile.
:: Piattaforme e Software interessati:
Apple Macintosh OS X
:: Impatto:
DoS
Spoofing
Manipolazione di dati
Hijacking
Esposizione di informazioni sensibili
Accesso al sistema
:: Soluzione:
Applicare l'aggiornamento:
http://www.apple.com/support/downloads/
:: Riferimenti:
Apple:
http://support.apple.com/kb/HT5045
Secunia:
http://secunia.com/advisories/46774/
Mitre CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3521
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3544
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3545
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3546
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3549
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3551
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3552
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3554
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3556
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3558
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3561
-----BEGIN PGP SIGNATURE-----
iQCVAwUBTrqGSvOB+SpikaiRAQJpkwQAulErpDhK8bt0FMKxxyjbcvHHqjIVh/FI
Ld/KMOn98h4/ibV5QY4AffJ2rKLZ2c1TvSSc2+wEJwtMiC9XMMxRjWMhxBAHWC5u
u/oziGpmmIjf4VD7HE39VK2fN+VaJIlS8DPlSQEA/m2wc28UPtVgoMWyEcLmwCe1
bZXfM5oSlXs=
=WNbD
-----END PGP SIGNATURE-----