Languages

About the security content of Java for OS X 2013-001 and Mac OS X v10.6 Update 13

This document describes the security content of Java for OS X 2013-001 and Mac OS X v10.6 Update 13, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates".

Java for OS X 2013-001 and Mac OS X v10.6 Update 13

  • Java

    Available for: OS X Lion v10.7 or later, OS X Lion Server v10.7 or later, OS X Mountain Lion 10.8 or later

    Impact: Multiple vulnerabilities in Java 1.6.0_37

    Description: Multiple vulnerabilities existed in Java 1.6.0_37, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues were addressed by updating to Java version 1.6.0_41. For Mac OS X v10.6 systems, these issues were addressed in Java for Mac OS X v10.6 Update 13. Further information is available via the Java website at http://www.oracle.com/technetwork/java/javase/releasenotes-136954.html

    CVE-ID

    CVE-2012-3213

    CVE-2012-3342

    CVE-2013-0351

    CVE-2013-0409

    CVE-2013-0419

    CVE-2013-0423

    CVE-2013-0424

    CVE-2013-0425

    CVE-2013-0426

    CVE-2013-0427

    CVE-2013-0428

    CVE-2013-0429

    CVE-2013-0432

    CVE-2013-0433

    CVE-2013-0434

    CVE-2013-0435

    CVE-2013-0438

    CVE-2013-0440

    CVE-2013-0441

    CVE-2013-0442

    CVE-2013-0443

    CVE-2013-0445

    CVE-2013-0446

    CVE-2013-0450

    CVE-2013-1473

    CVE-2013-1475

    CVE-2013-1476

    CVE-2013-1478

    CVE-2013-1480

    CVE-2013-1481

  • Java

    Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 or later, OS X Lion Server v10.7 or later, OS X Mountain Lion 10.8 or later

    Impact: Multiple vulnerabilities in Java

    Description: Multiple vulnerabilities existed in Java, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues were addressed by updating to Java version 1.6.0_41. Further information is available via the Java website at http://www.oracle.com/technetwork/java/javase/releasenotes-136954.html

    CVE-ID

    CVE-2013-0169

    CVE-2013-1486

    CVE-2013-1487

  • Malware removal

    Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 or later, OS X Lion Server v10.7 or later, OS X Mountain Lion 10.8 or later

    Description: This update runs a malware removal tool that will remove the most common variants of malware. If malware is found, it presents a dialog notifying the user that malware was removed. There is no indication to the user if malware is not found. This update is available for systems that installed Java 6.

Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information.
Last Modified: Feb 22, 2013
Helpful?
Yes
No
  • Last Modified: Feb 22, 2013
  • Article: HT5666
  • Views:

    null

Additional Product Support Information

Start a Discussion
in Apple Support Communities
See all questions on this article See all questions I have asked