Tag Archives: iOS

Apple release iTunes 10.7 (32 Bit and 64 Bit Editions)

Apple iTunes 10.7 (32 Bit and 64 Bit Editions) provides the following enhancements and security fixes

• Adds support for iOS 6 running on compatible iPhone, iPad, and iPod touch models

• Adds support for the latest iPod nano and iPod shuffle models

• Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution

• Description: Multiple memory corruption issues existed in WebKit. These issues are addressed through improved memory handling

• CVE-ID

• CVE-2011-3016 : miaubiz

• CVE-2011-3021 : Arthur Gerkis

• CVE-2011-3027 : miaubiz

• CVE-2011-3032 : Arthur Gerkis

• CVE-2011-3034 : Arthur Gerkis

• CVE-2011-3035 : wushi of team509 working with iDefense VCP, Arthur Gerkis

• CVE-2011-3036 : miaubiz

• CVE-2011-3037 : miaubiz

• CVE-2011-3038 : miaubiz

• CVE-2011-3039 : miaubiz

• CVE-2011-3040 : miaubiz

• CVE-2011-3041 : miaubiz

• CVE-2011-3042 : miaubiz

• CVE-2011-3043 : miaubiz

• CVE-2011-3044 : Arthur Gerkis

• CVE-2011-3050 : miaubiz

• CVE-2011-3053 : miaubiz

• CVE-2011-3059 : Arthur Gerkis

• CVE-2011-3060 : miaubiz

• CVE-2011-3064 : Atte Kettunen of OUSPG

• CVE-2011-3068 : miaubiz

• CVE-2011-3069 : miaubiz

• CVE-2011-3071 : pa_kt working with HP’s Zero Day Initiative

• CVE-2011-3073 : Arthur Gerkis

• CVE-2011-3074 : Slawomir Blazek

• CVE-2011-3075 : miaubiz

• CVE-2011-3076 : miaubiz

• CVE-2011-3078 : Martin Barbella of the Google Chrome Security Team

• CVE-2011-3081 : miaubiz

• CVE-2011-3086 : Arthur Gerkis

• CVE-2011-3089 : Skylined of the Google Chrome Security Team, miaubiz

• CVE-2011-3090 : Arthur Gerkis

• CVE-2011-3105 : miaubiz

• CVE-2011-3913 : Arthur Gerkis

• CVE-2011-3924 : Arthur Gerkis

• CVE-2011-3926 : Arthur Gerkis

• CVE-2011-3958 : miaubiz

• CVE-2011-3966 : Aki Helin of OUSPG

• CVE-2011-3968 : Arthur Gerkis

• CVE-2011-3969 : Arthur Gerkis

• CVE-2011-3971 : Arthur Gerkis

• CVE-2012-0682 : Apple Product Security

• CVE-2012-0683 : Dave Mandelin of Mozilla

• CVE-2012-1520 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP

• CVE-2012-1521 : Skylined of the Google Chrome Security Team, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP

• CVE-2012-2817 : miaubiz • CVE-2012-2818 : miaubiz

• CVE-2012-2829 : miaubiz

• CVE-2012-2831 : miaubiz

• CVE-2012-2842 : miaubiz

• CVE-2012-2843 : miaubiz

• CVE-2012-3589 : Dave Mandelin of Mozilla

• CVE-2012-3590 : Apple Product Security

• CVE-2012-3591 : Apple Product Security

• CVE-2012-3592 : Apple Product Security

• CVE-2012-3593 : Apple Product Security

• CVE-2012-3594 : miaubiz

• CVE-2012-3595 : Martin Barbella of Google Chrome Security

• CVE-2012-3596 : Skylined of the Google Chrome Security Team

• CVE-2012-3597 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3598 : Apple Product Security

• CVE-2012-3599 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3600 : David Levin of the Chromium development community

• CVE-2012-3601 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3602 : miaubiz

• CVE-2012-3603 : Apple Product Security

• CVE-2012-3604 : Skylined of the Google Chrome Security Team

• CVE-2012-3605 : Cris Neckar of the Google Chrome Security team

• CVE-2012-3606 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3607 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3608 : Skylined of the Google Chrome Security Team

• CVE-2012-3609 : Skylined of the Google Chrome Security Team

• CVE-2012-3610 : Skylined of the Google Chrome Security Team

• CVE-2012-3611 : Apple Product Security

• CVE-2012-3612 : Skylined of the Google Chrome Security Team

• CVE-2012-3613 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3614 : Yong Li of Research In Motion, Inc.

• CVE-2012-3615 : Stephen Chenney of the Chromium development community

• CVE-2012-3616 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3617 : Apple Product Security

• CVE-2012-3618 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3620 : Abhishek Arya of Google Chrome Security Team

• CVE-2012-3621 : Skylined of the Google Chrome Security Team

• CVE-2012-3622 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3623 : Skylined of the Google Chrome Security Team

• CVE-2012-3624 : Skylined of the Google Chrome Security Team

• CVE-2012-3625 : Skylined of Google Chrome Security Team

• CVE-2012-3626 : Apple Product Security

• CVE-2012-3627 : Skylined and Abhishek Arya of Google Chrome Security team

• CVE-2012-3628 : Apple Product Security

• CVE-2012-3629 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3630 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3631 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3632 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3633 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3634 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3635 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3636 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3637 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3638 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3639 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3640 : miaubiz

• CVE-2012-3641 : Slawomir Blazek

• CVE-2012-3642 : miaubiz

• CVE-2012-3643 : Skylined of the Google Chrome Security Team

• CVE-2012-3644 : miaubiz

• CVE-2012-3645 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3646 : Julien Chaffraix of the Chromium development community, Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3647 : Skylined of the Google Chrome Security Team

• CVE-2012-3648 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3649 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team

• CVE-2012-3651 : Abhishek Arya and Martin Barbella of the Google Chrome Security Team

• CVE-2012-3652 : Martin Barbella of Google Chrome Security Team

• CVE-2012-3653 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3654 : Skylined of the Google Chrome Security Team

• CVE-2012-3655 : Skylined of the Google Chrome Security Team

• CVE-2012-3656 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3657 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3658 : Apple

• CVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3660 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3661 : Apple Product Security

• CVE-2012-3663 : Skylined of Google Chrome Security Team

• CVE-2012-3664 : Thomas Sepez of the Chromium development community

• CVE-2012-3665 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3666 : Apple

• CVE-2012-3667 : Trevor Squires of propaneapp.com

• CVE-2012-3668 : Apple Product Security

• CVE-2012-3669 : Apple Product Security

• CVE-2012-3670 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer, Arthur Gerkis

• CVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome Security Team

• CVE-2012-3672 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3673 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3674 : Skylined of Google Chrome Security Team

• CVE-2012-3675 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3676 : Julien Chaffraix of the Chromium development community

• CVE-2012-3677 : Apple

• CVE-2012-3678 : Apple Product Security

• CVE-2012-3679 : Chris Leary of Mozilla

• CVE-2012-3680 : Skylined of Google Chrome Security Team

• CVE-2012-3681 : Apple

• CVE-2012-3682 : Adam Barth of the Google Chrome Security Team

• CVE-2012-3683 : wushi of team509 working with iDefense VCP

• CVE-2012-3684 : kuzzcc

• CVE-2012-3685 : Apple Product Security

• CVE-2012-3686 : Robin Cao of Torch Mobile (Beijing)

• CVE-2012-3687 : kuzzcc

• CVE-2012-3688 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3692 : Skylined of the Google Chrome Security Team, Apple Product Security

• CVE-2012-3699 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3700 : Apple Product Security

• CVE-2012-3701 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3702 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3703 : Apple Product Security

• CVE-2012-3704 : Skylined of the Google Chrome Security Team

• CVE-2012-3705 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3706 : Apple Product Security

• CVE-2012-3707 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3708 : Apple

• CVE-2012-3709 : Apple Product Security

• CVE-2012-3710 : James Robinson of Google

• CVE-2012-3711 : Skylined of the Google Chrome Security Team

• CVE-2012-3712 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

You can download Apple iTunes 10.7 by visiting the following link http://www.apple.com/itunes/

Adobe AIR 3.4.0.2710 Released for Windows, Macintosh and Android

Adobe AIR 3.4.0.2710 has now been released

Fixed Issues

• Resolves buffer overflow vulnerabilities that could lead to code execution (CVE-2012-5248, CVE-2012-5249, CVE-2012-5250, CVE-2012-5251, CVE-2012-5253, CVE-2012-5254, CVE-2012-5255, CVE-2012-5257, CVE-2012-5259, CVE-2012-5260, CVE-2012-5262, CVE-2012-5264, CVE-2012-5265, CVE-2012-5266)

• Resolves memory corruption vulnerabilities that could lead to code execution (CVE-2012-5252, CVE-2012-5256, CVE-2012-5258, CVE-2012-5261, CVE-2012-5263, CVE-2012-5267, CVE-2012-5268, CVE-2012-5269, CVE-2012-5270, CVE-2012-5271, CVE-2012-5272)

• Unable to package an application using an ANE on iOS, which doesn’t not implement the finalizer function (3325320)

• Packaging fails with null pointer exception, when packaging an IPA using only the default implementation in the ANE on iOS (3325321)

• Database data is wiped out for every launch on iOS Simulator (3329309)

• WIFi Debugging on iOS – Debugging on iOS does not work when network interface is chosen as “Default” for Player Target AIR3.4 (3325323)

Adobe AIR 3.4.0.2710 can be downloaded from http://www.adobe.com

VideoLAN VLC Media Player Version 2.0.0 Released for Windows and Mac OS X

VideoLAN VLC Media Player Version 2.0.0 has been released and includes the following fixes and new features:

Video
  • Rewritten video output core and modules, allowing subpicture blending in GPU
  • Shader support in the OpenGL output, for colorspace conversion, including 10bits
  • New video outputs for Windows 7, Android, iOS and OS/2
  • New debanding, grain, denoising and anti-flickering filters
  • New deinterlacing filter, including an Inverse Telecine algorithm
Audio
  • New resamplers for higher quality audio
  • New dynamic range compressor and karaoke filters
  • Simplification of the audio core for faster processing
  • New audio outputs for iOS, Android and OS/2
Formats
  • Multi-threaded decoding for H.264, MPEG-4/Xvid and WebM
  • Support for 10bits codecs, WMV image and some other codecs
  • Rewritten support for images, including jpeg, png, xcf, bmp
  • Important changes in RealVideo and Real Format support
  • CrystalHD cards and Android OpenMAX support for hardware decoding
Input and Devices
  • Experimental support for BluRay discs: [Menus are deactivated in this release (will come soon)] [AACS and BD+ DRM libraries and keys are not shipped, for legal reasons]
  • Support for SDI capture cards and QTKit devices
  • Support for new adaptive streaming protocols, like HLS and DASH
For Mac Users
  • Completely new, single window interface: [Available in 2 colors: Lion grey and QTX black] [Extensions support and better Lion integration]
  • Support for all QTKit devices through qtcapture and qtsound modules
  • Continued support for X 10.5 and PPC users (1080p and ProRes on Dual-G5!)
For Anime Fans
  • Vastly improved MKV demuxer
  • Rewritten linked segments and ordered chapter files support
  • Correct support for FLAC, RV and Hi10p in MKV
  • Rewritten seeking support in cue files
  • Various ASS subtitles improvements
For professional Users
  • Support for ProRes 422 and 4444, AVC/Intra
  • Support for Jpeg-2000, Dirac and DNxHD/VC-3 in 10bits
  • Support for EBU subtitles (stl) and EIA-608
  • SDI and HD-SDI card support for input on Linux
  • New Dirac/VC-2 encoder, faster than the previous one
For Developers
  • libVLC, libVLCcore and libcompat have switched from GPL to LGPLv2.1+
  • New libVLC examples are available: media player, photobooth and mediainfo clones
  • New JSON requests on the web interface to control running VLC instances
  • Implementation of the MPRIS2 interface to control media players
  • VLC’s web plugins have been rewritten for better integration and stability in all browsers

VLC Media Player can be download from http://www.videolan.org/vlc/#download

Adobe AIR 3.3.0.3650 Released for Windows, Macintosh and Android

Adobe AIR 3.3.0.3650 has now been released and includes the followings new features:

• USB debugging for AIR iOS — This new feature allows the iOS developer to connect to the desktop via USB while debugging their mobile applications instead of relying on network connectivity

• Enhanced Background behavior for AIR iOS — Background support now more closely resembles native applications in iOS. In addition to some basic multitasking and background audio support that is already enabled with AIR for iOS, applications may now support location updates and networking in the background, as well as being notified when a background app is about to be suspended by the operating system

• Stylus support for Android 4.0 — Stylus support in Flash takes advantage of the new-in-4.0 Android Stylus API, so that stylus-aware apps work automatically with any devices supporting the Android API set

• Simulator Support (Mac) — With the enhanced simulator support a developer can now package and run an application on iOS simulator using ADT commands. This feature allows an iOS developer to develop and run an application without needing an actual set of devices by using the iOS simulator using Xcode

• Aspect Ratio Enhancements — With AIR 3.3 the issue with the runtime ignoring the specified aspect ratio has been resolved. In this release we address this use-case by allowing only screen orientation corresponding to app specified aspectRatio and orientation corresponding to 180 degree device rotation from the specified aspectRatio

• Improved Mac App Store Support — Added support to ensure Mac AIR apps adhere to Apple guidelines and can be submitted to the Mac App store successfully