OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
APPLE-SA-2013-12-16-1 Safari 6.1.1 and Safari 7.0.1

From: Apple Product Security (product-security-noreplylists.apple.com)
Date: Mon Dec 16 2013 - 15:25:25 CST


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2013-12-16-1 Safari 6.1.1 and Safari 7.0.1

Safari 6.1.1 and Safari 7.0.1 are now available and address the
following:

Safari
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks v10.9
Impact: User credentials may be disclosed to an unexpected site via
autofill
Description: Safari may have autofilled user names and passwords
into a subframe from a different domain than the main frame. This
issue was addressed through improved origin tracking.
CVE-ID
CVE-2013-5227 : Niklas Malmgren of Klarna AB

WebKit
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks v10.9
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2013-2909 : Atte Kettunen of OUSPG
CVE-2013-5195 : Apple
CVE-2013-5196 : Google Chrome Security Team
CVE-2013-5197 : Google Chrome Security Team
CVE-2013-5198 : Apple
CVE-2013-5199 : Apple
CVE-2013-5225 : Google Chrome Security Team
CVE-2013-5228 : Keen Team (K33nTeam) working with HP's Zero Day
Initiative

For OS X Mavericks systems, Safari 7.0.1 will be included
in OS X Mavericks 10.9.1.

For OS X Mountain Lion systems Safari 6.1 may be obtained from
Mac App Store.

For OS X Lion systems Safari 6.1 is available via the Apple Software
Update application.

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=fhyS
-----END PGP SIGNATURE-----

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJSr2/FAAoJEPefwLHPlZEw2JwP/3TWQWEM8z6OzTNrv2D4cf81
iz3ihMY7ZK/KV03rmR27ejmVfUL/jDG6g08DZKfdtIQRvssbx8wP9k632M4KKp5T
7Unq13SLNwjoTnAROd/hDkfxQ+gU9i3+peCCsqhdMSItXSgJyCbI3RA7v83gR0WW
f6ESTofQrH40Bhn6uS54L7UEmRKeVGpHafszvHg1t349x06qyNjUdFgHPPUj5I3P
AeR3rHRiOZjvYs/yPN1GfDUM+gSoPK38G6dYMoSh53vwTTDgy4FnFwAHJrlleuGW
pmzIpZODwp1omNPGpIBvCXQXI2ZW1E3dSemrJeyo1KBj6/esk5pbcgAPN9vrcSDt
DzTe5H3K1HIxKu7J7Il8OLbi6sXaGa4yfqlpJwwvUexAOjiMNzPPsqqHFpJrXK1a
EZJGL4TSL57I/LxCB3YMNSZXfSZjO+8PWWjU0F8/0PYykN/03Vj5he2LcIYwcMX8
K2KmvnOdR84tsRRogVQ7aCVga0M99Vr8nCs+54aLM66dExTnFITeSAgu1cEt88U7
p6miRZAqEBc9BXYf45THGKf5OUv+u7fP3A0X72BQ+aFytIpzSyFad3CRK30jtmGH
xq4GeypZgG3YtrX+sfjvJR0FhzzvYqhVvM/8u94XnKJcKFg/jrxlRu6GoNQYj4la
YFx+B5VqAyaNsVr3hfTO
=ruLv
-----END PGP SIGNATURE-----