OS

iOS 9.3.5 (Mansoor)

 

ios_935

 

iOS 9.3.5 provides an important security update for your iPhone or iPad and is recommended for all users.

For information on the security content of Apple software updates, please visit this website:

https://support.apple.com/kb/HT201222

 

Searching informations :
=============================================
Apple releases iOS 9.3.5 to fix 3 zero-day vulnerabilities. | "Trident" vulnerabilities were used to target a human rights activist. | The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender | The Trident Exploit Chain. | Ahmed Mansoor received suspicious text messages
=============================================

 

WebKit
=============================================

  • Available for: iPhone 4s and later, iPad 2 and later, iPod touch (5th generation) and later.
  • Impact: Visiting a maliciously crafted website may lead to arbitrary code execution.
  • Description: A memory corruption issue was addressed through improved memory handling.
  • CVE-2016-4657: Citizen Lab and Lookout.

=============================================

 

Kernel
=============================================

  • Available for: iPhone 4s and later, iPad 2 and later, iPod touch (5th generation) and later
  • Impact: An application may be able to disclose kernel memory
  • Description: A validation issue was addressed through improved input sanitization.
  • CVE-2016-4655: Citizen Lab and Lookout.

=============================================

 

Kernel
=============================================

  • Available for: iPhone 4s and later, iPad 2 and later, iPod touch (5th generation) and later
  • Impact: An application may be able to execute arbitrary code with kernel privileges.
  • Description: A memory corruption issue was addressed through improved memory handling.
  • CVE-2016-4656: Citizen Lab and Lookout.

=============================================

 

More details : https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/

 

Share this post from Rbcafe :
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on LinkedInEmail this to someoneShare on RedditBuffer this page

Powershell Mac

Powershell has been released on GitHub.

 

Powershell

 

Welcome to the PowerShell GitHub Community! PowerShell is a cross-platform (Windows, Linux, and OS X) automation and configuration tool/framework that works well with your existing tools and is optimized for dealing with structured data (e.g. JSON, CSV, XML, etc.), REST APIs, and object models. It includes a command-line shell, an associated scripting language and a framework for processing cmdlets.

 

PowerShell becomes multiplatform

 

Additional platforms will be supported in the future, says Microsoft. The firm book parallel the source code for Windows PowerShell and Linux. PowerShell is based on .Net, Microsoft .Net needed on other platforms in order to bear PowerShell also on other platforms, says the creator of the tool, Jeffrey Snover.

 

microsoft_powershell_1

 

Once operational Core .NET on Linux and Mac OS X – via .NET 1.0 Core – the publisher has changed for PowerShell that it works. The PowerShell Core version is the one that Microsoft will deliver with Nano Server for Windows Server 2016, says Jeffrey Snover to ZDNet.com. « The current PowerShell users who need to manage their heterogeneous areas will want it. People building management tools like us with Operations Management Suite (OMS) desire. Those who want to standardize on a specific set of tools will want this » ensures the father of PowerShell.

 

Install PowerShell on OS X 10.11

 

Using OS X 10.11, download the PKG package powershell-6.0.0-alpha.9.pkg from the releases page onto the OS X machine. Either double-click the file and follow the prompts, or install it from the terminal:

 

sudo installer -pkg powershell-6.0.0-alpha.9.pkg -target /

 

Paths

 

$PSHOME is /opt/microsoft/powershell/6.0.0-alpha.9/
User profiles will be read from ~/.config/powershell/profile.ps1
Default profiles will be read from $PSHOME/profile.ps1
User modules will be read from ~/.local/share/powershell/Modules
Shared modules will be read from /usr/local/share/powershell/Modules
Default modules will be read from $PSHOME/Modules
PSReadLine history will be recorded to ~/.local/share/powershell/PSReadLine/ConsoleHost_history.txt

 

The profiles respect PowerShell’s per-host configuration, so the default host-specific profiles exists at Microsoft.PowerShell_profile.ps1 in the same locations. On Linux and OS X, the XDG Base Directory Specification is respected. Note that because OS X is a derivation of BSD, instead of /opt, the prefix used is /usr/local. Thus, $PSHOME is /usr/local/microsoft/powershell/6.0.0-alpha.9/, and the symlink is placed at /usr/local/bin/powershell.

 

https://github.com/PowerShell/PowerShell/

 

Share this post from Rbcafe :
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on LinkedInEmail this to someoneShare on RedditBuffer this page

macOS

The future would be macOS during the next WWDC ?

Mac OS 9 > Mac OS X > OS X > macOS ?

One proof of this possibility ?

 

FUFlightViewController

 

Apple iPhone & iPad : iOS
Apple TV : tvOS
Apple Watch : watchOS

Regarding the others OS. The prefix is i,tv,watch, before « OS ».

So why not using macOS for the uniformity of the OS ?

 

Share this post from Rbcafe :
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on LinkedInEmail this to someoneShare on RedditBuffer this page

WiFiKeychainProxy

WiFiKeychainProxy(8) / BSD System Manager’s Manual / WiFiKeychainProxy(8)

 

NAME

WiFiKeychainProxy — XPC helper tool for accessing WiFi keychain items

SYNOPSIS

WiFiKeychainProxy

DESCRIPTION

WiFiKeychainProxy XPC XPC helper tool for accessing WiFi keychain items

SYSTEM AGENT

com.apple.wifi.WiFiKeychainProxy

 

Share this post from Rbcafe :
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on LinkedInEmail this to someoneShare on RedditBuffer this page

OS X El Capitan v10.11.4

Désolé, cet article est seulement disponible en Anglais Américain. Pour le confort de l’utilisateur, le contenu est affiché ci-dessous dans une autre langue. Vous pouvez cliquer le lien pour changer de langue active.

The OS X El Capitan v10.11.4 Update improves the stability, compatibility, and security of your Mac, and is recommended for all users.

 

OS X El Capitan v10.11.4

 

OS X El Capitan v10.11.4 update :

Adds the ability to passcode-protect notes containing personal data in Notes
Adds the ability to sort notes alphabetically, by date created, or date modified in Notes
Adds the ability to import Evernote files into Notes
Adds support for sharing Live Photos between iOS and OS X via AirDrop and Messages
Addresses an issue that may cause RAW images to open slowly in Photos
Adds the ability for iBooks to store PDFs in iCloud, making them available across all your devices
Fixes an issue that prevented loading Twitter t.co links in Safari
Prevents JavaScript dialogs from blocking access to other webpages in Safari
Fixes an issue that prevented the VIPs mailbox from working with Gmail accounts
Fixes an issue that caused USB audio devices to disconnect
Improves the compatibility and reliability of Apple USB-C Multiport Adapters

 

OS X El Capitan v10.11.4 Enterprise content:

Fixes an issue that could cause a black screen after logging in as the root user
Fixes an issue that prevents using screen sharing to remotely click the Allow button or Always Allow button in Keychain Access
Fixes an issue that prevents Migration Assistant from opening when automatic login has been disabled using a configuration profile
Fixes an issue that prevents Mail from showing the date and time of certain Microsoft Exchange calendar events
Provides compatibility with the Cisco AnyConnect VPN client
Improves the reliability of connecting to a Personal Hotspot via Wi-Fi
For detailed information about the security content of this update, see Apple Security Updates.

 

Share this post from Rbcafe :
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on LinkedInEmail this to someoneShare on RedditBuffer this page

OS X El Capitan v10.11.3

Désolé, cet article est seulement disponible en Anglais Américain. Pour le confort de l’utilisateur, le contenu est affiché ci-dessous dans une autre langue. Vous pouvez cliquer le lien pour changer de langue active.

The OS X El Capitan v10.11.3 Update is recommended for all OS X El Capitan users.

 

El Capitan

 

The OS X El Capitan v10.11.3 Update improves the stability, compatibility, and security of your Mac, and is recommended for all users.

OS X El Capitan v10.11.3 update : Fixes an issue that may prevent some Mac computers from waking from sleep when connected to certain 4K displays.

Enterprise content : Third-party .pkg file receipts stored in /var/db/receipts are now retained when upgrading from OS X Yosemite.

Security Updates (OS X El Capitan 10.11.3 and Security Update 2016-001) :

 

AppleGraphicsPowerManagement

 

  • Available for: OS X El Capitan v10.11 to v10.11.2
  • Impact: A local user may be able to execute arbitrary code with kernel privileges.
  • Description: A memory corruption issue was addressed through improved memory handling.
  • CVE-2016-1716 : moony li of Trend Micro and Liang Chen and Sen Nie of KeenLab, Tencent.

 

Disk Images

 

  • Available for: OS X El Capitan v10.11 to v10.11.2.
  • Impact: A local user may be able to execute arbitrary code with kernel privileges.
  • Description: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling.
  • CVE-2016-1717 : Frank Graziano of Yahoo! Pentest Team.

 

IOAcceleratorFamily

 

  • Available for: OS X El Capitan v10.11.0 to v10.11.2.
  • Impact: A local user may be able to execute arbitrary code with kernel privileges.
  • Description: A memory corruption issue was addressed through improved memory handling.
  • CVE-2016-1718 : Juwei Lin Trend Micro working with HP’s Zero Day Initiative.

 

IOHIDFamily

 

  • Available for: OS X El Capitan v10.11 to v10.11.2.
  • Impact: A local user may be able to execute arbitrary code with kernel privileges.
  • Description: A memory corruption issue existed in an IOHIDFamily API. This issue was addressed through improved memory handling.
  • CVE-2016-1719 : Ian Beer of Google Project Zero.

 

IOKit

 

  • Available for: OS X El Capitan v10.11 to v10.11.2.
  • Impact: A local user may be able to execute arbitrary code with kernel privileges.
  • Description: A memory corruption issue was addressed through improved memory handling.
  • CVE-2016-1720 : Ian Beer of Google Project Zero.

 

Kernel

 

  • Available for: OS X El Capitan v10.11 to v10.11.2.
  • Impact: A local user may be able to execute arbitrary code with kernel privileges.
  • Description: A memory corruption issue was addressed through improved memory handling.
  • CVE-2016-1721 : Ian Beer of Google Project Zero and Ju Zhu of Trend Micro.

 

libxslt

 

  • Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.2.
  • Impact: Visiting a maliciously crafted website may lead to arbitrary code execution.
  • Description: A type confusion issue existed in libxslt. This issue was addressed through improved memory handling.
  • CVE-2015-7995 : puzzor.

 

OSA Scripts

 

  • Available for: OS X El Capitan v10.11 to v10.11.2.
  • Impact: A quarantined application may be able to override OSA script libraries installed by the user.
  • Description: An issue existed when searching for scripting libraries. This issue was addressed through improved search order and quarantine checks.
  • CVE-2016-1729 : an anonymous researcher.

 

syslog

 

  • Available for: OS X El Capitan v10.11 to v10.11.2.
  • Impact: A local user may be able to execute arbitrary code with root privileges.
  • Description: A memory corruption issue was addressed through improved memory handling.
  • CVE-2016-1722 : Joshua J. Drake and Nikias Bassen of Zimperium zLabs.

 

Share this post from Rbcafe :
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on LinkedInEmail this to someoneShare on RedditBuffer this page
Page 1 sur 71234567
Rbcafe © 2004- | Rb Cafe 1.3 | Contacter Rbcafe | Rbcafe sur Twitter | Rbcafe sur Facebook | Politique de confidentialité