Subscribe via feed.
Posts under OSX security tools

Zero Day Initiative Advisory 11-251

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-251 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime handles invalid values in the Sync Sample Atom.

Tags: , ,

Zero Day Initiative Advisory 11-250

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-250 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.

Tags: ,

iPhone/iPad Phone Drive 1.1.1 Directory Traversal

Posted by deepcore under Apple, iphone, OSX security tools (No Respond)

iPhone/iPad Phone Drive version 1.1.1 suffers from a directory traversal vulnerability.

Tags: , , ,

Apple Security Advisory 2011-08-03-1

Posted by deepcore under Apple, OSX security tools, Security (No Respond)

Apple Security Advisory 2011-08-03-1 – QuickTime version 7.7 has been made available to address multiple code execution, cross-origin, integer overflow, memory corruption, and other vulnerabilities.

Tags: , , ,

Secunia Security Advisory 45516

Posted by deepcore under Apple, exploit, OSX security tools, Security (No Respond)

Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user’s system.

Tags: , , , ,

strongSwan IPsec Implementation 4.5.3

Posted by deepcore under Android, Apple, OSX security tools (No Respond)

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface.

Tags: , ,

Zero Day Initiative Advisory 11-243

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-243 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit as utilized by either Apple Safari, or Google’s Chrome browser. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the library handles implicitly defined styles

Tags: , , ,

Zero Day Initiative Advisory 11-242

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-242 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari’s Webkit.

Tags: , , , ,

Zero Day Initiative Advisory 11-240

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-240 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari’s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the library’s support of SVG markers

Tags: , ,

Zero Day Initiative Advisory 11-239

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-239 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari Webkit.

Tags: , ,