lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 28 Jan 2020 14:36:51 -0800
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: Apple Product Security via Security-announce
 <security-announce@...ts.apple.com>
Subject: [FD] APPLE-SA-2020-1-28-5 Safari 13.0.5

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2020-1-28-5 Safari 13.0.5

Safari 13.0.5 is now available and addresses the following:

Safari
Available for: macOS Mojave and macOS High Sierra, and included in
macOS Catalina
Impact: Visiting a malicious website may lead to address bar spoofing
Description: An inconsistent user interface issue was addressed with
improved state management.
CVE-2020-3833: Nikhil Mittal (@c0d3G33k) of Payatu Labs (payatu.com)

Safari Login AutoFill
Available for: macOS Mojave and macOS High Sierra, and included in
macOS Catalina
Impact: A local user may unknowingly send a password unencrypted over
the network
Description: The issue was addressed with improved UI handling.
CVE-2020-3841: Sebastian Bicchi (@secresDoge) from Sec-Research

Installation note:

Safari 13.0.5 may be obtained from the Mac App Store.

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
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=zlOg
-----END PGP SIGNATURE-----


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ