About Security Update 2015-003

This document describes the security content of Security Update 2015-003.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see Apple Security Updates.

Security Update 2015-003

  • iCloud Keychain

    Available for: OS X Yosemite v10.10.2

    Impact: An attacker with a privileged network position may be able to execute arbitrary code

    Description: Multiple buffer overflows existed in the handling of data during iCloud Keychain recovery. These issues were addressed through improved bounds checking.

    CVE-ID

    CVE-2015-1065 : Andrey Belenko of NowSecure

  • IOSurface

    Available for: OS X Yosemite v10.10.2

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: A type confusion issue existed in IOSurface's handling of serialized objects. The issue was addressed through additional type checking.

    CVE-ID

    CVE-2015-1061 : Ian Beer of Google Project Zero

Note: Security Update 2015-003 includes the content of Security Update 2015-002. For further details, see About Security Update 2015-002.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Дата опублікування: