exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Apple Security Advisory 2011-10-12-5

Apple Security Advisory 2011-10-12-5
Posted Oct 13, 2011
Authored by Apple | Site apple.com

Apple Security Advisory 2011-10-12-5 - Pages for iOS version 1.5 is now available and addresses an arbitrary code execution vulnerability.

tags | advisory, arbitrary, code execution
systems | cisco, apple
advisories | CVE-2011-1417
SHA-256 | 266ef02de7f6041b775e847d47f1381e09f83e7fc41a3cf6e1d001241a8a0efb

Apple Security Advisory 2011-10-12-5

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2011-10-12-5 Pages for iOS v1.5

Pages for iOS v1.5 is now available and addresses the following:

Pages
Available for: iOS
Impact: Opening a maliciously crafted Microsoft Word document may
lead to an unexpected application termination or arbitrary code
execution
Description: A memory corruption issue existed in the handling of
Microsoft Word documents. Opening a maliciously crafted Microsoft
Word document in Pages may lead to an unexpected application
termination or arbitrary code execution.
CVE-ID
CVE-2011-1417 : Charlie Miller and Dion Blazakis working with
TippingPoint's Zero Day Initiative


Pages for iOS v1.5 is available for download via the App Store.

To check the current version of software, select
"Settings -> Pages -> Version".

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.16 (Darwin)

iQEcBAEBAgAGBQJOlcw5AAoJEGnF2JsdZQee6ToH/12zfiky7n/WeHgWmeE09SJd
cQvbeG1w0u3dd4YFay0tq9MKFZUM9gO+ENktouUS+PWPPn+C6BEQuniGx7HR+UKr
RCIUfIvsZphBb2F+GO4PjanOmZ2Yl3xXgOIcvQPVKm6T2uNc8rbcYjFsmW+57FOa
98etSMUaSF6hcX97sN19r6/5qcS9XzWHFtenPbIq9pInHxxja1mSRDM11pt6qrkz
rSLuh/bNjmZGrsF9McJe7F1n6fsqCXYaXuV+ZcfUvfZZgVhPJe2KSoP/fzNFbmuS
eWvv+4FHNIzmuapgoeglpBQy7X0vMc1R+JLqRytjZ6LPK2HifZpiZVeVW3y4r98=
=f/3c
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close