
This article is more than 1 year old
Let's get patchin' now, everybody's watchin' how, baby fix Safari with me
Come on Apple, patch up your browser….
Apple has pushed out an largish update for security flaws in its Safari browser.
The Cupertino giant said that the Safari 8.0.4, 7.1.4 and 6.2.4 patch would address 17 CVE-listed vulnerabilities in the browser.
The collective update, which patches the newest version of Safari along with older copies on legacy OS X versions, addresses a number of memory corruption flaws in the WebKit browser, including vulnerabilities that would allow remote code execution.
The patch also addresses a flaw that would allow phishing attacks to go undetected.
Cook & Co is advising users to install the fix, though more most the update will be installed automatically through the Apple Software Update utility. Users should be sure that their copy of Safari is the latest build - version 8.0.4, 7.1.4 or 6.2.4 - to prevent attacks.
Not mentioned in the update was a fix for the ongoing private browsing vulnerability plaguing Safari. That flaw is leaving some users vulnerable to the disclosure of sites visited in private browsing sessions.
Apple's latest fix arrives just over a week from Microsoft's last scheduled update. That fix brought Windows users a host of patches for vulnerabilities in Internet Explorer, including remote code execution flaws.
Adobe has also followed suit in releasing an update for security holes in its Flash plug-in.
Cupertino credited its own researchers as well as Google Chrome Security Team members in reporting the vulnerabilities. No other researchers were credited. ®
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- AirTag
- Android
- Apple M1
- Application Delivery Controller
- App stores
- Authentication
- Azure
- BEC
- Bing
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Gemini
- Google AI
- Google Cloud Platform
- Google I/O
- Google Nest
- G Suite
- Hacker
- Hacking
- Hacktivism
- HoloLens
- iCloud
- Identity Theft
- iMac
- Incident response
- Infosec
- iOS
- iPad
- iPhone
- iPod
- iTunes
- Kenna Security
- Kubernetes
- Mac
- MacBook
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Patch Tuesday
- Phishing
- Pixel
- Pluton
- Privacy Sandbox
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- SharePoint
- Siri
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- Tavis Ormandy
- Tim Cook
- TLS
- Trojan
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Vulnerability
- Wannacry
- Windows
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Zero trust
Broader topics
More about
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- AirTag
- Android
- Apple M1
- Application Delivery Controller
- App stores
- Authentication
- Azure
- BEC
- Bing
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Gemini
- Google AI
- Google Cloud Platform
- Google I/O
- Google Nest
- G Suite
- Hacker
- Hacking
- Hacktivism
- HoloLens
- iCloud
- Identity Theft
- iMac
- Incident response
- Infosec
- iOS
- iPad
- iPhone
- iPod
- iTunes
- Kenna Security
- Kubernetes
- Mac
- MacBook
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Patch Tuesday
- Phishing
- Pixel
- Pluton
- Privacy Sandbox
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- SharePoint
- Siri
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- Tavis Ormandy
- Tim Cook
- TLS
- Trojan
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Vulnerability
- Wannacry
- Windows
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Zero trust