![]() This issue was addressed with improved validation. Impact: An attacker may tamper with code-signed applications to execute arbitrary code in the application's contextĭescription: A code signing verification issue existed in dyld. These issues were addressed through improved bounds checking.ĬVE-2016-1737 : Happil圜oded (ant4g0nist &r3dsm0k3) dfont file may lead to arbitrary code executionĭescription: Multiple memory corruption issues existed in the handling of font files. Impact: Processing a maliciously crafted. This issue was addressed through improved error handling.ĬVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Pathĭescription: Multiple memory corruption issues were addressed through improved memory handling.ĬVE-2016-1735 : Jeonghoon : beist and ABH of BoB Impact: A USB device may be able to cause a denial of serviceĭescription: An error handling issue existed in packet validation. This was addressed through improved input validation.ĬVE-2016-1732 : Proteas of Qihoo 360 Nirvan Team Impact: A local user may be able to determine kernel memory layoutĭescription: An out-of-bounds read issue existed that led to the disclosure of kernel memory. Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A memory corruption issue was addressed through improved input validation.ĬVE-2016-1733 : Proteas of Qihoo 360 Nirvan Team These were addressed by updating libpng to version 1.6.20.Īvailable for: OS X El Capitan v10.11 to v10.11.3 png file may lead to arbitrary code executionĭescription: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3
0 Comments
Leave a Reply. |