Exploit the possiblities

Apple Security Advisory 2016-12-12-2

Apple Security Advisory 2016-12-12-2
Posted Dec 12, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-12-12-2 - watchOS 3.1.1 is now available and addresses code execution and authorization issues.

tags | advisory, code execution
systems | apple
advisories | CVE-2016-7626, CVE-2016-7651
MD5 | 017afe40b631e4fdb60a7b000f0ffc6b

Apple Security Advisory 2016-12-12-2

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2016-12-12-2 watchOS 3.1.1

watchOS 3.1.1 is now available and addresses the following:

Accounts
Available for: All Apple Watch models
Impact: An issue existed which did not reset the authorization
settings on app uninstall
Description: This issue was addressed through improved sanitization.
CVE-2016-7651: Ju Zhu and Lilang Wu of Trend Micro

Profiles
Available for: All Apple Watch models
Impact: Opening a maliciously crafted certificate may lead to
arbitrary code execution
Description: A memory corruption issue existed in the handling of
certificate profiles. This issue was addressed through improved input
validation.
CVE-2016-7626: Maksymilian Arciemowicz (cxsecurity.com)

Installation note:

Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641

To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".

Alternatively, on your watch, select "My Watch > General > About".

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org

iQIcBAEBCgAGBQJYTiRQAAoJEIOj74w0bLRGF7gP/Ai6yr5v+PBxDWHtEksBs3es
eroQA8hmzgvrF3zm7DOfRvJyvAKhIczxCdx9hebIIvbRFRkQkwdYPaTaLqO29iWH
xdY8FN6QCMSVvE5/yVhAUCcEfyE9V9u1uQlvzMUMZh/5rkxtwko+Ubegtw/X8O6Z
n+ldjlAGViBvhthNQXTq2JSmo9sROcLvgo2kCKwL9adgxU2H9YqBksjbrcY37zHd
Lq3dz/JhN30JmkPH/u/ksm94BOZAUVyGym1wfDERMSioObac6nmXr3cZ4dUM7dat
5pVZ35SNCWkARIeDSVIpdD+h94/NoyIfmPrPv4zTPjXMHEeqQYvnfpYFSewHPr0s
kzdNKpjnI3Ytx8Tjtlpq0n0pJehbSlhr2UgGSWZCIso6Ew5siEI0vvz7YyI2AtRJ
Ch/yZvaUWGNt4qhjUxYfBSyrS0upG0pVP43jgi9RHXF/kSD72Ek08DDI/uDn/v5Q
P16yBIogYNCq79M1S3POoDy5uQlqF9fKouxV+wlquBfLFsDm03Utiewgw3mwC5vc
zEy1bYVW/OPKslfBgQv3OTCpVcMocs1N4hIrcTxXke1l4VbHXflopaiz/tF1T86o
s4qaTu3kAyS6dB55sftI1AtqUA7taMUJ1iOgCpSI+e6xBocz3xUQm+r5yNf53sC3
Krj4IV2NhP4HVlVu2V3X
=Qt14
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close