
Here, a crook who has already broken in as a regular user can grant himself more power, often all the way up to root (Administrator). That’s where an outsider can find out which programs are loaded where in memory, thus neutralising the protection of ASLR (address space layout randomisation) and giving crooks a clearer target to aim at when they attack. That’s where externally-supplied content, like a web page, could trick your Mac or iDevice into running malware without even an “Are you sure?” pop-up. Rather than try to deal with OS X and iOS by “summarising in detail,” patch by patch, we’ll just say that there are lots of security holes fixed, including at least: To update QuickTime on Windows, run the Apple Software Update program from the Start menu. QuickTime’s Windows-specific update seems a little more current, with 9 CVE-numbered bugs, all apparently fairly recently reported. Good because the fixes are out at last bad because there are 39 CVE-numbered bugs on the list, including remote code execution holes, with 15 of them dating back to 2014. That’s both good and bad news for Windows users. To see if your Mac is up-to-date go to Apple Menu | App Store | Updates.Īlthough Mac users will see an iTunes update in their mix, it looks as though the security-related fixes apply only to Windows. QuickTime goes to 7.7.7 on Windows (Vista and 7 only).
#QUICKTIME UPDATE FOR MAC FOR MAC#
iTunes goes to 12.2 for Mac and Windows users.The previous two OS Xs get a standlone firmware update.The previous two OS Xs get a standalone security update, 2015-005.


Yes, there are numerous new features and products in there too, but it’s the security fixes that make a compelling reason to update.Īs usual, Apple’s Security Updates landing page, HT201222 (often still linked to under its old 4-digit code of HT1222), has a summary of the non-Windows updates.

Apple just opened the stopcocks and released a Hoover Dam’s worth of security-related updates.
