Alert GCSA-17075 - Apple Security Updates APPLE-SA-2017-12-6
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-17075
Data : 07 dicembre 2017
Titolo : Apple Security Updates APPLE-SA-2017-12-6
******************************************************************
:: Descrizione del problema
Apple ha rilasciato degli aggiornamenti di sicurezza che risolvono
alcune vulnerabilita' presenti in vari software.
Un aggressore remoto potrebbe sfruttare alcune di queste vulnerabilita'
per prendere il controllo dei sistemi esposti.
Per una descrizione completa delle vulnerabilita' consultare
le segnalazioni ufficiali.
:: Piattaforme e Software interessati
Apple iOS
Apple tvOS
Apple watchOS
Apple macOS Sierra
Apple macOS High Sierra
Apple macOS El Capitan
:: Impatto
Esecuzione da remoto di codice arbitrario
:: Soluzione
Aggiornamenti per Mac
https://support.apple.com/en-us/HT208331
Aggiornamento del software iOS
https://support.apple.com/en-us/HT208334
Aggiornamenti per watchOS
https://support.apple.com/en-us/HT208325
Aggiornamenti per tvOS
https://support.apple.com/en-us/HT208327
:: Riferimenti
Apple security updates
https://support.apple.com/en-eg/HT201222
SecurityTrack
https://www.securitytracker.com/id/1039966
Mitre CVE References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13826
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13833
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13847
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13860
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13861
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13862
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13865
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13867
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13868
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13869
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13871
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13872
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13874
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13875
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13876
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13878
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13879
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13883
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlopXl8ACgkQwZxMk2USYEITbQCgg+vQ8oYNm2LpA5ik2r+9797W
XkUAniVrpZhZUYHE/h/udXoIlLYRjPqs
=X+D0
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-17075
Data : 07 dicembre 2017
Titolo : Apple Security Updates APPLE-SA-2017-12-6
******************************************************************
:: Descrizione del problema
Apple ha rilasciato degli aggiornamenti di sicurezza che risolvono
alcune vulnerabilita' presenti in vari software.
Un aggressore remoto potrebbe sfruttare alcune di queste vulnerabilita'
per prendere il controllo dei sistemi esposti.
Per una descrizione completa delle vulnerabilita' consultare
le segnalazioni ufficiali.
:: Piattaforme e Software interessati
Apple iOS
Apple tvOS
Apple watchOS
Apple macOS Sierra
Apple macOS High Sierra
Apple macOS El Capitan
:: Impatto
Esecuzione da remoto di codice arbitrario
:: Soluzione
Aggiornamenti per Mac
https://support.apple.com/en-us/HT208331
Aggiornamento del software iOS
https://support.apple.com/en-us/HT208334
Aggiornamenti per watchOS
https://support.apple.com/en-us/HT208325
Aggiornamenti per tvOS
https://support.apple.com/en-us/HT208327
:: Riferimenti
Apple security updates
https://support.apple.com/en-eg/HT201222
SecurityTrack
https://www.securitytracker.com/id/1039966
Mitre CVE References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13826
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13833
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13847
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13860
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13861
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13862
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13865
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13867
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13868
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13869
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13871
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13872
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13874
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13875
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13876
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13878
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13879
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13883
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlopXl8ACgkQwZxMk2USYEITbQCgg+vQ8oYNm2LpA5ik2r+9797W
XkUAniVrpZhZUYHE/h/udXoIlLYRjPqs
=X+D0
-----END PGP SIGNATURE-----