Αυτό το άρθρο έχει αρχειοθετηθεί και δεν ενημερώνεται πλέον από την Apple.

About the security content of AirPort Time Capsule and AirPort Base Station (802.11n) Firmware 7.6

This document describes the security content of AirPort Time Capsule and AirPort Base Station (802.11n) Firmware 7.6.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates".

AirPort Time Capsule and AirPort Base Station (802.11n) Firmware 7.6

  • Available for: AirPort Extreme Base Station with 802.11n, AirPort Express Base Station with 802.11n, AirPort Time Capsule

    Impact: An attacker in a privileged network position may be able to cause arbitrary command execution via malicious DHCP responses

    Description: dhclient allowed remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message. This issue is addressed by stripping shell metacharacters in dhclient-script.

    CVE-ID

    CVE-2011-0997 : Sebastian Krahmer and Marius Tomaschewski of the SUSE Security Team working with ISC

Installation note for Firmware version 7.6

Firmware version 7.6 is installed into AirPort Time Capsule or AirPort Base Station with 802.11n via AirPort Utility, provided with the device.

It is recommended that AirPort Utility 5.5.3 or later be installed before upgrading to Firmware version 7.6.

AirPort Utility 5.5.3 or later may be obtained through Apple's Software Download site: http://www.apple.com/support/downloads/

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Ημερομηνία δημοσίευσης: