Alert GCSA - 17067 - Apple Security Updates APPLE-SA-2017-10-31
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
**********************************************************************
Alert ID: GCSA-17067
Data: 02 Novembre 2017
Titolo: Apple Security Updates APPLE-SA-2017-10-31
**********************************************************************
:: Descrizione del problema
Apple ha rilasciato degli aggiornamenti di sicurezza che risolvono
alcune vulnerabilita' presenti in vari software.
Un aggressore remoto potrebbe sfruttare alcune di queste vulnerabilita'
per prendere il controllo dei sistemi esposti.
Per una descrizione completa delle vulnerabilita' consultare
le segnalazioni ufficiali.
:: Piattaforme e Software interessati
Apple iOS
Apple tvOS
Apple watchOS
Apple Safari
Apple macOS Sierra
Apple macOS High Sierra
Apple macOS El Capitan
Apple iCloud for Windows
Apple iTunes fir Windows
:: Impatto
Esecuzione di codice arbitrario
Cross Site Scripting
Denial of Service
:: Soluzione
Aggiornamenti per Mac
https://support.apple.com/it-it/HT201541
Aggiornamento del software iOS
https://support.apple.com/it-it/HT204204
:: Riferimenti
Apple security updates
https://support.apple.com/en-eg/HT201222
SecurityTrack
https://www.securitytracker.com/id/1039703
https://www.securitytracker.com/id/1039705
https://www.securitytracker.com/id/1039706
https://www.securitytracker.com/id/1039707
https://www.securitytracker.com/id/1039708
https://www.securitytracker.com/id/1039709
https://www.securitytracker.com/id/1039710
Mitre CVE References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13793
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13794
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13795
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13796
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13813
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13816
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13821
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13828
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13832
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13841
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13846
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7132
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAln8Q6QACgkQwZxMk2USYEJxWACgql1N5AQ+GQiNkAEW0zsITUHj
u/8AoNTxsyKXn3vaXPec11tIfJ9qh4dv
=4/DJ
-----END PGP SIGNATURE-----
Hash: SHA1
**********************************************************************
Alert ID: GCSA-17067
Data: 02 Novembre 2017
Titolo: Apple Security Updates APPLE-SA-2017-10-31
**********************************************************************
:: Descrizione del problema
Apple ha rilasciato degli aggiornamenti di sicurezza che risolvono
alcune vulnerabilita' presenti in vari software.
Un aggressore remoto potrebbe sfruttare alcune di queste vulnerabilita'
per prendere il controllo dei sistemi esposti.
Per una descrizione completa delle vulnerabilita' consultare
le segnalazioni ufficiali.
:: Piattaforme e Software interessati
Apple iOS
Apple tvOS
Apple watchOS
Apple Safari
Apple macOS Sierra
Apple macOS High Sierra
Apple macOS El Capitan
Apple iCloud for Windows
Apple iTunes fir Windows
:: Impatto
Esecuzione di codice arbitrario
Cross Site Scripting
Denial of Service
:: Soluzione
Aggiornamenti per Mac
https://support.apple.com/it-it/HT201541
Aggiornamento del software iOS
https://support.apple.com/it-it/HT204204
:: Riferimenti
Apple security updates
https://support.apple.com/en-eg/HT201222
SecurityTrack
https://www.securitytracker.com/id/1039703
https://www.securitytracker.com/id/1039705
https://www.securitytracker.com/id/1039706
https://www.securitytracker.com/id/1039707
https://www.securitytracker.com/id/1039708
https://www.securitytracker.com/id/1039709
https://www.securitytracker.com/id/1039710
Mitre CVE References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13793
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13794
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13795
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13796
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13813
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13816
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13821
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13828
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13832
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13841
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13846
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7132
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAln8Q6QACgkQwZxMk2USYEJxWACgql1N5AQ+GQiNkAEW0zsITUHj
u/8AoNTxsyKXn3vaXPec11tIfJ9qh4dv
=4/DJ
-----END PGP SIGNATURE-----