Alert GCSA-15005 - Apple Security Updates APPLE-SA-2015-01-27
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
**********************************************************************
Alert ID: GCSA-15005
Data: 27 Gennaio 2015
Titolo: Apple Security Updates APPLE-SA-2015-01-27
**********************************************************************
:: Descrizione del problema
Apple ha rilasciato vari aggiornamenti che risolvono numerose
vulnerabilita' presenti nei sistemi operativi OS X, Apple iOS,
Safari, Apple TV:
APPLE-SA-2015-01-27-1 Apple TV 7.0.3
APPLE-SA-2015-01-27-2 iOS 8.1.3
APPLE-SA-2015-01-27-3 Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3
APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001
APPLE-SA-2015-01-27-5 OS X: Flash Player plug-in blocked
Per una descrizione completa delle vulnerabilita' consultare
le segnalazioni ufficiali.
:: Piattaforme e Software interessati
Apple iOS
Apple Os X
Apple OS X Server
Apple TV
Apple Safari
:: Impatto
Security Bypass
Esposizione di informazioni sensibili
Acquisizione di privilegi piu' elevati
Esecuzione di codice arbitrario
Modifica del Firmware
Accesso al sistema
:: Soluzione
Applicare i security update:
http://www.apple.com/support/downloads/
http://www.apple.com/it/osx/apps/app-store.html
http://developer.apple.com/
:: Riferimenti
Apple security updates
http://support.apple.com/kb/ht1222
APPLE-SA-2015-01-27-1 Apple TV 7.0.3
http://support.apple.com/en-us/HT204246
APPLE-SA-2015-01-27-2 iOS 8.1.3
http://support.apple.com/en-us/HT204245
APPLE-SA-2015-01-27-3 Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3
http://support.apple.com/en-us/HT204243
APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001
http://support.apple.com/en-us/HT204244
APPLE-SA-2015-01-27-5 OS X: Flash Player plug-in blocked
http://support.apple.com/en-us/HT202681
Security Tracker
http://www.securitytracker.com/id/1031624
http://www.securitytracker.com/id/1031625
http://www.securitytracker.com/id/1031626
http://www.securitytracker.com/id/1031647
http://www.securitytracker.com/id/1031650
http://www.securitytracker.com/id/1031652
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4476
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4488
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4492
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4493
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4494
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4497
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4498
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4499
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8816
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8821
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8826
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8827
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8828
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8832
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8833
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8837
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8840
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlTJ6y4ACgkQwZxMk2USYEKhWgCaAqI4tPYhCzaifxr2zr7INeN1
ds0An0yRJgqKxePhXwZ0NwS404mr5BeL
=XlUk
-----END PGP SIGNATURE-----
Hash: SHA1
**********************************************************************
Alert ID: GCSA-15005
Data: 27 Gennaio 2015
Titolo: Apple Security Updates APPLE-SA-2015-01-27
**********************************************************************
:: Descrizione del problema
Apple ha rilasciato vari aggiornamenti che risolvono numerose
vulnerabilita' presenti nei sistemi operativi OS X, Apple iOS,
Safari, Apple TV:
APPLE-SA-2015-01-27-1 Apple TV 7.0.3
APPLE-SA-2015-01-27-2 iOS 8.1.3
APPLE-SA-2015-01-27-3 Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3
APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001
APPLE-SA-2015-01-27-5 OS X: Flash Player plug-in blocked
Per una descrizione completa delle vulnerabilita' consultare
le segnalazioni ufficiali.
:: Piattaforme e Software interessati
Apple iOS
Apple Os X
Apple OS X Server
Apple TV
Apple Safari
:: Impatto
Security Bypass
Esposizione di informazioni sensibili
Acquisizione di privilegi piu' elevati
Esecuzione di codice arbitrario
Modifica del Firmware
Accesso al sistema
:: Soluzione
Applicare i security update:
http://www.apple.com/support/downloads/
http://www.apple.com/it/osx/apps/app-store.html
http://developer.apple.com/
:: Riferimenti
Apple security updates
http://support.apple.com/kb/ht1222
APPLE-SA-2015-01-27-1 Apple TV 7.0.3
http://support.apple.com/en-us/HT204246
APPLE-SA-2015-01-27-2 iOS 8.1.3
http://support.apple.com/en-us/HT204245
APPLE-SA-2015-01-27-3 Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3
http://support.apple.com/en-us/HT204243
APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001
http://support.apple.com/en-us/HT204244
APPLE-SA-2015-01-27-5 OS X: Flash Player plug-in blocked
http://support.apple.com/en-us/HT202681
Security Tracker
http://www.securitytracker.com/id/1031624
http://www.securitytracker.com/id/1031625
http://www.securitytracker.com/id/1031626
http://www.securitytracker.com/id/1031647
http://www.securitytracker.com/id/1031650
http://www.securitytracker.com/id/1031652
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4476
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4488
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4492
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4493
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4494
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4497
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4498
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4499
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8816
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8821
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8826
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8827
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8828
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8832
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8833
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8837
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8840
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlTJ6y4ACgkQwZxMk2USYEKhWgCaAqI4tPYhCzaifxr2zr7INeN1
ds0An0yRJgqKxePhXwZ0NwS404mr5BeL
=XlUk
-----END PGP SIGNATURE-----