![]() Impact: Viewing a maliciously crafted MPEG file may lead to an unexpected application termination or arbitrary code execution - Description: An integer overflow existed in the handling of MPEG files.CVE-2012-0658 : Luigi Auriemma working with HP's Zero Day Initiative For Mac OS X v10.6 systems, this issue is addressed in Security Update 2012-002. ![]() For OS X Lion systems, this issue is addressed in OS X Lion v10.7.4.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |