-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1878
                         Security Update 2014-005
                              17 October 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          OS X
Publisher:        Apple
Operating System: OS X
Impact/Access:    Access Confidential Data -- Remote with User Interaction
                  Reduced Security         -- Remote with User Interaction
Resolution:       Patch/Upgrade
CVE Names:        CVE-2014-3566  

Reference:        ASB-2014.0122
                  ESB-2014.1872
                  ESB-2014.1871
                  ESB-2014.1869
                  ESB-2014.1868.2
                  ESB-2014.1863
                  ESB-2014.1860
                  ESB-2014.1859
                  ESB-2014.1858
                  ESB-2014.1857
                  ESB-2014.1849

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2014-10-16-2 Security Update 2014-005

Security Update 2014-005 is now available and addresses the
following:

Secure Transport
Available for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5
Impact:  An attacker may be able to decrypt data protected by SSL
Description:  There are known attacks on the confidentiality of SSL
3.0 when a cipher suite uses a block cipher in CBC mode. An attacker
could force the use of SSL 3.0, even when the server would support a
better TLS version, by blocking TLS 1.0 and higher connection
attempts. This issue was addressed by disabling CBC cipher suites
when TLS connection attempts fail.
CVE-ID
CVE-2014-3566 : Bodo Moeller, Thai Duong, and Krzysztof Kotowicz of
Google Security Team

Note: Security Update 2014-005 includes the security content of
OS X bash Update 1.0. For further details see
https://support.apple.com/kb/HT6495


Security Update 2014-005 may be obtained from the Mac App Store or
Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=c286
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=hDx/
-----END PGP SIGNATURE-----