Apple Security Advisory 2013-01-28-2 - Apple TV 5.2 is now available and addresses multiple security vulnerabilities.
42bab3685b63ecaaa1a338a87d718948262788e299652246eee46d5030ba1a1e
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2013-01-28-2 Apple TV 5.2
Apple TV 5.2 is now available and addresses the following:
Apple TV
Available for: Apple TV 2nd generation and later
Impact: A user-mode process may be able to access the first page of
kernel memory
Description: The kernel has checks to validate that the user-mode
pointer and length passed to the copyin and copyout functions would
not result in a user-mode process being able to directly access
kernel memory. The checks were not being used if the length was
smaller than one page. This issue was addressed through additional
validation of the arguments to copyin and copyout.
CVE-ID
CVE-2013-0964 : Mark Dowd of Azimuth Security
Apple TV
Available for: Apple TV 2nd generation
Impact: A remote attacker on the same WiFi network may be able to
cause an unexpected system termination
Description: An out of bounds read issue exists in Broadcom's
BCM4325 and BCM4329 firmware's handling of 802.11i information
elements. This issue was addressed through additional validation of
802.11i information elements.
CVE-ID
CVE-2012-2619 : Andres Blanco and Matias Eissler of Core Security
Installation note:
Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> General -> Update Software".
To check the current version of software, select
"Settings -> General -> About".
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org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=fPxD
-----END PGP SIGNATURE-----