Apple released security updates last week for OS X, iOS, Safari and OS X Server, which take care of over 100 vulnerabilities, including the local privilege escalation Zero Day.
OS X Yosemite 10.10.5 addresses a total of 135 security holes, according to an advisory published by Apple. The list includes issues affecting components such as Apache, Bluetooth, bootp, Data Detectors Engine, the date/time preferences pane, the Dictionary app, DiskImages, FontParser, groff, ImageIO, the kernel, QuickTime, sudo, Python, PostgreSQL, and various libraries.
Apple also went to fix the local privilege escalation vulnerability (CVE-2015-3760) reported privately to the company a few months ago by the researcher known as “beist.” The Zero Day ended up disclosed publicly in July by German researcher Stefan Esser. The company said the flaw is a path validation issue in the dynamic linker dyld.
The flaw, related to the DYLD_PRINT_TO_FILE environment variable, has been undergoing exploitation.
Apple fixed the vulnerability in the upcoming OS X 10.11, also known as El Capitan, but not in current releases. The advisory said the patch available for OS X Yosemite v10.10 to v10.10.4 addresses the bug through “improved environment sanitization.”
Apple also patched 71 vulnerabilities in iOS, including ones leveraged for jailbreaks. The security bugs fixed by iOS 8.4.1 affect various components, including Air Traffic, Backup, bootp, code signing, the kernel, ImageIO, Safari, and WebKit.
Some of the flaws addressed with the release of iOS 8.4.1 are the same as those patched in OS X.
Twenty-six WebKit-related vulnerabilities have also been patched with the release of Safari 8.0.8, 7.1.8, and 6.2.8.
Apple also updated OS X Server. Version 4.1.5 released to address the denial-of-service (DoS) vulnerability affecting the BIND DNS software.