Home page logo
/

bugtraq logo Bugtraq mailing list archives

APPLE-SA-2014-02-11-1 Boot Camp 5.1
From: Apple Product Security <product-security-noreply () lists apple com>
Date: Wed, 12 Feb 2014 10:42:41 -0800

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2014-02-11-1 Boot Camp 5.1

Boot Camp 5.1 is now available and addresses the following:

Boot Camp
Available for:  Macs running Boot Camp 5
Impact:  Loading a malformed executable file may cause memory
corruption in the kernel
Description:  A bounds checking issue existed in the AppleMNT.sys
driver's parsing of Portable Executable files. If a Portable
Executable file with a malformed header is loaded, this could cause a
Boot Camp driver to corrupt kernel memory. The issue was addressed
through improved bounds checking.
CVE-ID
CVE-2014-1253 : MJ0011 of 360 Security Center


Boot Camp 5.1 may be obtained via Apple Software Update or from:
http://support.apple.com/downloads/

Depending on your Mac model, the downloading file name is one of
the following two:

The download file name: BootCamp5.1.5621.zip
Its SHA-1 digest: 72c71be259474836c17ddd400aca2218660b8aac

The download file name: BootCamp5.1.5640.zip
Its SHA-1 digest: 2998a7881509a87b22abc6764379c0a33b6ced3a

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=Dlmy
-----END PGP SIGNATURE-----

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail


  By Date           By Thread  

Current thread:
  • APPLE-SA-2014-02-11-1 Boot Camp 5.1 Apple Product Security (Feb 13)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]