[<prev] [next>] [day] [month] [year] [list]
Message-Id: <516FB1F6-306F-4ACA-8D8A-3CB695B52C01@lists.apple.com>
Date: Wed, 21 Oct 2015 14:50:34 -0700
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2015-10-21-8 OS X Server 5.0.15
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2015-10-21-8 OS X Server 5.0.15
OS X Server 5.0.15 is now available and addresses the following:
BIND
Available for: OS X Yosemite 10.10.5,
OS X El Capitan 10.11.1 or later
Impact: Multiple vulnerabilities in BIND
Description: Multiple vulnerabilities existed in BIND versions prior
to 9.9.7-P3, one of which may have allowed a remote attacker to cause
a denial of service. These issues were addressed by updating BIND to
version 9.9.7-P3.
CVE-ID
CVE-2015-5722 : Hanno Böck from the Fuzzing Project
CVE-2015-5986
Web Service
Available for: OS X Yosemite 10.10.5,
OS X El Capitan 10.11.1 or later
Impact: A remote attacker may be able to bypass access restrictions
Description: An HTTP header field reference was missing from the
configuration files. This issue was addressed by adding the HTTP
header field reference to the configuration file.
CVE-ID
CVE-2015-7031 : an anonymous researcher
Installation note:
OS X Server 5.0.15 may be obtained from the Mac App Store.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org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=icYN
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists