About the security content of Apple TV 7.1

This document describes the security content of Apple TV 7.1.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see Apple Security Updates.

AppleTV 7.1

  • Apple TV

Available for: Apple TV 3rd generation and later

Impact: An attacker with a privileged network position may intercept SSL/TLS connections

Description: Secure Transport accepted short ephemeral RSA keys, usually used only in export-strength RSA cipher suites, on connections using full-strength RSA cipher suites. This issue, also known as FREAK, only affected connections to servers which support export-strength RSA cipher suites, and was addressed by removing support for ephemeral RSA keys.

CVE-ID

CVE-2015-1067 : Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti, and Jean Karim Zinzindohoue of Prosecco at Inria Paris

  • Apple TV

    Available for: Apple TV 3rd generation and later

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: A type confusion issue existed in IOSurface's handling of serialized objects. The issue was addressed through additional type checking.

    CVE-ID

    CVE-2015-1061 : Ian Beer of Google Project Zero

  • Apple TV

    Available for: Apple TV 3rd generation and later

    Impact: An malicious application may be able to create folders in trusted locations in the file system

    Description: An issue existed in the developer disk mounting logic which resulted in invalid disk image folders not being deleted. This was addressed through improved error handling.

    CVE-ID

    CVE-2015-1062 : TaiG Jailbreak Team

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: