This article has been archived and is no longer updated by Apple.

iWork: Security features in the iWork 9.1 Update

Learn more about the security features in the iWork 9.1 Update.

iWork 9.1 Update

  • Numbers

    Available for: iWork 9.0 through 9.0.5

    Impact: Opening a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution

    Description: A buffer overflow existed in the handling of Excel files. Opening a maliciously crafted Excel file in Numbers may lead to an unexpected application termination or arbitrary code execution.

    CVE-ID

    CVE-2010-3785 : Apple

  • Numbers

    Available for: iWork 9.0 through 9.0.5.

    Impact: Opening a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution.

    Description: A memory corruption issue existed in the handling of Excel files. Opening a maliciously crafted Excel file in Numbers may lead to an unexpected application termination or arbitrary code execution.

    CVE-ID

    CVE-2010-3786 : Tobias Klein, working with VeriSign iDefense Labs

  • Pages

    Available for: iWork 9.0 through 9.0.5

    Impact: Opening a maliciously crafted Microsoft Word document may lead to an unexpected application termination or arbitrary code execution.

    Description: A memory corruption issue existed in the handling of Microsoft Word documents. Opening a maliciously crafted Microsoft Word document in Pages may lead to an unexpected application termination or arbitrary code execution.

    CVE-ID

    CVE-2011-1417 : Charlie Miller and Dion Blazakis working with TippingPoint's Zero Day Initiative

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: