Impact: An attacker in a privileged network position may be able to cause a relayed call to continue transmitting audio while appearing as if the call terminatedĭescription: User interface inconsistencies existed in the handling of relayed calls.
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code executionĭescription: A memory corruption issue was addressed through improved input validation.ĬVE-2016-4681: Ke Liu of Tencent's Xuanwu LabĬVE-2016-4673: Marco Grassi of KeenLab Tencent This issue was addressed by removing unsolicited proxy password authentication prompts. Impact: An attacker in a privileged network position may be able to leak sensitive user informationĭescription: A phishing issue existed in the handling of proxy credentials. Impact: A local user may be able to execute arbitrary code with additional privilegesĬVE-2016-4674: Shrek_wzw of Qihoo 360 Nirvan Team Impact: Processing a maliciously crafted font file may lead to arbitrary code executionĭescription: A memory corruption issue was addressed through improved memory handling.ĬVE-2016-4667: Simon Huang of alipay, Moony Li of TrendMicro, updated October 27, 2016 Impact: A local user may be able to elevate privilegesĭescription: A null pointer dereference was addressed through improved locking.ĬVE-2016-4678: working with Trend Micro's Zero Day Initiative This issue was addressed through additional validation.ĬVE-2016-7584: Mark Mentovai and Boris Vidolov of Google Inc. Impact: A signed executable may substitute code with the same team IDĭescription: A validation issue existed in the handling of code signatures. Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A memory corruption issue was addressed through improved lock state checking. Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6