Operating System:

[Win]

Published:

24 January 2017

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0200
                         iCloud for Windows 6.1.1
                              24 January 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Apple iCloud
Publisher:         Apple
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-2366 CVE-2017-2356 CVE-2017-2355
                   CVE-2017-2354  

Reference:         ESB-2017.0195.2

Original Bulletin: 
   https://support.apple.com/kb/HT201222

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2017-01-23-6 iCloud for Windows 6.1.1

iCloud for Windows 6.1.1 is now available and addresses the
following:

WebKit
Available for:  Windows 7 and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed through
improved memory handling.
CVE-2017-2354: Neymar of Tencent's Xuanwu Lab (tencent.com) working
with Trend Micro's Zero Day Initiative

WebKit
Available for:  Windows 7 and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A memory initialization issue was addressed through
improved memory handling.
CVE-2017-2355: Team Pangu and lokihardt at PwnFest 2016

WebKit
Available for:  Windows 7 and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed through
improved input validation.
CVE-2017-2356: Team Pangu and lokihardt at PwnFest 2016
CVE-2017-2366: Kai Kang of Tencent's Xuanwu Lab (tencent.com)

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
- -----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=9t5N
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9ptv
-----END PGP SIGNATURE-----