Alert GCSA-16020 - Apple Security Updates APPLE-SA-2016-03-21
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
**********************************************************************
Alert ID: GCSA-16020
Data: 23 Marzo 2016
Titolo: Apple Security Updates APPLE-SA-2016-03-21
**********************************************************************
:: Descrizione del problema
Apple ha rilasciato aggiornamenti che risolvono alcune vulnerabilita'
presenti nei sistemi operativi OS X, Apple iOS, watchOS, tvOS, Xcode,
OS X Server e nel Browser Safari:
APPLE-SA-2016-03-21-1 iOS 9.3
APPLE-SA-2016-03-21-2 watchOS 2.2
APPLE-SA-2016-03-21-3 tvOS 9.2
APPLE-SA-2016-03-21-4 Xcode 7.3
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002
APPLE-SA-2016-03-21-6 Safari 9.1
APPLE-SA-2016-03-21-7 OS X Server 5.1
Per una descrizione completa delle vulnerabilita' consultare
le segnalazioni ufficiali.
:: Piattaforme e Software interessati
Apple iOS
Apple OS X El Capitan
Apple OS X Server
Apple Safari
Apple watchOS
Apple tvOS
Apple Xcode
:: Impatto
Accesso locale e remoto al sistema
Esposizione di informazioni sensibili
Esecuzione locale e remota di codice arbitrario
Escalation di privilegi
Esposizione di informazioni sensibili
Denial of Service
:: Soluzione
Applicare i security update:
http://www.apple.com/support/downloads/
http://www.apple.com/it/osx/apps/app-store.html
:: Riferimenti
Apple security updates
http://support.apple.com/kb/ht1222
https://support.apple.com/en-us/HT201222
APPLE-SA-2016-03-21-1 iOS 9.3
https://support.apple.com/en-us/HT206166
APPLE-SA-2016-03-21-2 watchOS 2.2
http://prod.lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
APPLE-SA-2016-03-21-3 tvOS 9.2
http://prod.lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
APPLE-SA-2016-03-21-4 Xcode 7.3
http://prod.lists.apple.com/archives/security-announce/2016/Mar/msg00003.html
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002
https://support.apple.com/en-us/HT206167
APPLE-SA-2016-03-21-6 Safari 9.1
https://support.apple.com/en-us/HT206171
APPLE-SA-2016-03-21-7 OS X Server 5.1
https://support.apple.com/en-us/HT206173
SecurityTracker
http://www.securitytracker.com/id/1035342
http://www.securitytracker.com/id/1035352
http://www.securitytracker.com/id/1035353
http://www.securitytracker.com/id/1035354
http://www.securitytracker.com/id/1035363
MITRE-CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8659
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1717
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1719
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1720
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1732
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1733
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1735
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1736
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1738
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1745
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1746
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1751
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1752
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1754
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1755
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1756
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1757
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1760
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1761
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1763
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1764
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1765
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1773
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1779
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1781
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlbyYK4ACgkQwZxMk2USYEKilgCeLISQ3SvgfggmHKLfJyznk5Cf
YS4AoLJ6sKEsi4uUIjqgmp84mp0Tv0bY
=Q+Sc
-----END PGP SIGNATURE-----
Hash: SHA1
**********************************************************************
Alert ID: GCSA-16020
Data: 23 Marzo 2016
Titolo: Apple Security Updates APPLE-SA-2016-03-21
**********************************************************************
:: Descrizione del problema
Apple ha rilasciato aggiornamenti che risolvono alcune vulnerabilita'
presenti nei sistemi operativi OS X, Apple iOS, watchOS, tvOS, Xcode,
OS X Server e nel Browser Safari:
APPLE-SA-2016-03-21-1 iOS 9.3
APPLE-SA-2016-03-21-2 watchOS 2.2
APPLE-SA-2016-03-21-3 tvOS 9.2
APPLE-SA-2016-03-21-4 Xcode 7.3
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002
APPLE-SA-2016-03-21-6 Safari 9.1
APPLE-SA-2016-03-21-7 OS X Server 5.1
Per una descrizione completa delle vulnerabilita' consultare
le segnalazioni ufficiali.
:: Piattaforme e Software interessati
Apple iOS
Apple OS X El Capitan
Apple OS X Server
Apple Safari
Apple watchOS
Apple tvOS
Apple Xcode
:: Impatto
Accesso locale e remoto al sistema
Esposizione di informazioni sensibili
Esecuzione locale e remota di codice arbitrario
Escalation di privilegi
Esposizione di informazioni sensibili
Denial of Service
:: Soluzione
Applicare i security update:
http://www.apple.com/support/downloads/
http://www.apple.com/it/osx/apps/app-store.html
:: Riferimenti
Apple security updates
http://support.apple.com/kb/ht1222
https://support.apple.com/en-us/HT201222
APPLE-SA-2016-03-21-1 iOS 9.3
https://support.apple.com/en-us/HT206166
APPLE-SA-2016-03-21-2 watchOS 2.2
http://prod.lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
APPLE-SA-2016-03-21-3 tvOS 9.2
http://prod.lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
APPLE-SA-2016-03-21-4 Xcode 7.3
http://prod.lists.apple.com/archives/security-announce/2016/Mar/msg00003.html
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002
https://support.apple.com/en-us/HT206167
APPLE-SA-2016-03-21-6 Safari 9.1
https://support.apple.com/en-us/HT206171
APPLE-SA-2016-03-21-7 OS X Server 5.1
https://support.apple.com/en-us/HT206173
SecurityTracker
http://www.securitytracker.com/id/1035342
http://www.securitytracker.com/id/1035352
http://www.securitytracker.com/id/1035353
http://www.securitytracker.com/id/1035354
http://www.securitytracker.com/id/1035363
MITRE-CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8659
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1717
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1719
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1720
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1732
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1733
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1735
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1736
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1738
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1745
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1746
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1751
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1752
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1754
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1755
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1756
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1757
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1760
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1761
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1763
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1764
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1765
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1773
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1779
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1781
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlbyYK4ACgkQwZxMk2USYEKilgCeLISQ3SvgfggmHKLfJyznk5Cf
YS4AoLJ6sKEsi4uUIjqgmp84mp0Tv0bY
=Q+Sc
-----END PGP SIGNATURE-----