tvOS 9.1 is now available and addresses the following:
AppleMobileFileIntegrity
Available for: Apple TV (4th generation)
Impact: A malicious application may be able to execute arbitrary
code with system privileges
Description: An access control issue was addressed by preventing
modification of access control structures.
CVE-ID
CVE-2015-7055 : Apple
AppSandbox
Available for: Apple TV (4th generation)
Impact:…
*Timelines*
April, 2015: Vulnerabilities found
April 2015: Reported to Optus & CERT
April – October 2015: CERT (US/AUS) attempts to identify vendor / device
ownership. None found.
Dec 03,…
the executable installers [°] of the videolan client (VLC, see
<http://www.videolan.org/>) are vulnerable:
1. They load and execute a rogue/bogus/malicious ShFolder.dll [‘][²]
(and other DLLs like SetupAPI.dll or UXTheme.dll too) eventually
found in the directory they are started from (the “application
directory”).
For software downloaded with a web browser this is typically the…
1. They load and execute a rogue/bogus/malicious ShFolder.dll [‘][²]
(and other DLLs like SetupAPI.dll or UXTheme.dll too) eventually
found in the directory they are started from (the “application…
executable installers [°] created with JRSoft InnoSetup
(see <http://jrsoftware.org/isinfo.php>; this includes of course
InnoSetup itself too) are vulnerable:
1. They load and execute a rogue/bogus/malicious UXTheme.dll [‘]
eventually found in the directory they are started from (the
“application directory”).
For software downloaded with a web browser this is typically the
“Downloads”…
the executable installers [°] of 7-Zip (see <http://www.7-zip.org/>)
and ALL self-extracting archives created with 7-Zip are vulnerable:
1. They load and execute a rogue/bogus/malicious UXTheme.dll [‘]
eventually found in the directory they are started from (the
“application directory”).
For software downloaded with a web browser this is typically the
“Downloads” directory: see
<…
the executable installers [°] of Google Chrome are vulnerable:
1. ChromeStandaloneSetup.exe and ChromeSetup.exe load and execute
a rogue/bogus/malicious CryptBase.dll (under Windows NT6.x)
from their “application directory” [‘].
For software downloaded with a web browser this is typically the
“Downloads” directory: see
<…
An unusual DDoS amplification attack was carried out 10 days ago against many of the Internet’s 13 root name servers, the authoritative servers used to resolve IP addresses.