{"id":12045,"date":"2013-03-18T12:29:43","date_gmt":"2013-03-18T20:29:43","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=12045"},"modified":"2014-04-23T14:09:48","modified_gmt":"2014-04-23T21:09:48","slug":"mac-os-x-10-8-3-released-with-apples-security-update-2013-001","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/","title":{"rendered":"Mac OS X 10.8.3 Released with Apple\u2019s Security Update 2013-001"},"content":{"rendered":"<p>Last week, Apple released a new version of its OS X Mountain Lion operating system to <a href=\"http:\/\/support.apple.com\/kb\/HT5612\">Mac OS X 10.8.3<\/a>. This update includes multiple bug fixes and improves the security of Mac OS X. Included with Mac OS X 10.8.3 are\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-6-0-3-security-update-fixes-webkit-flaws\/\" target=\"_blank\">Safari 6.0.3<\/a> and Security Update 2013-001, both of which address multiple security problems. For Mac users running OS X Lion, the 33 MB Security Update 2013-001 shipped alongside the Safari 6.0.3 software update.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/apple-security-update-2013-001\/\" rel=\"attachment wp-att-12047\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12047\" title=\"Apple Security Update 2013-001\" alt=\"Security Update 2013-001 software update notice\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Apple-Security-Update-2013-001.png\" width=\"607\" height=\"625\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Apple-Security-Update-2013-001.png 607w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Apple-Security-Update-2013-001-145x150.png 145w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Apple-Security-Update-2013-001-291x300.png 291w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><\/a><\/p>\n<p>Apple silently bundled\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-shocks-security-world-with-safari-5-1-8-for-snow-leopard\/\" target=\"_blank\">Safari 5.1.8 with the Snow Leopard version<\/a>\u00a0of Security Update 2013-001. Oddly, Apple has not released any details about this update on its Apple security updates page.<\/p>\n<p>Altogether, the contents of these security updates include bug fixes for Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.5, and OS X Lion Server v10.7 to v10.7.5, in addition to OS X Mountain Lion v10.8 to v10.8.2. Overall, a total of 21 <a href=\"http:\/\/support.apple.com\/kb\/HT5672\" target=\"_blank\">security issues<\/a> are fixed, covering\u00a017 separate CVEs, 9 of which are related to arbitrary code execution (CVE-2013-0156 and CVE-2013-0333 include flaws impacting multiple components of Apple software).<\/p>\n<p>Also included in this software update is a malware removal tool that will remove some of the most common variants of Mac malware. (Naturally, here at Intego we recommend our comprehensive <a title=\"Mac Anti-Virus\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Mac anti-virus<\/a> software since we offer award-winning protection with timelier malware definition updates.)<\/p>\n<p>Following are details provided by Apple on the security issues documented as offering remote attackers the potential for arbitrary code execution:<\/p>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2088\" target=\"_blank\">CVE-2012-2088<\/a> :\u00a0A buffer overflow existed in libtiff&#8217;s handling of TIFF images. This issue was addressed through additional validation of TIFF images.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0976\" target=\"_blank\">CVE-2013-0976<\/a> :\u00a0A memory corruption issue existed in the handling of graphics data. This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0971\" target=\"_blank\">CVE-2013-0971<\/a> :\u00a0A use after free issue existed in the handling of ink annotations in PDF files. This issue was addressed through improved memory management.<\/li>\n<li>Available for\u00a0<strong>Mac OS X Server 10.6.8, OS X Lion Server v10.7 to v10.7.5:\u00a0<\/strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0156\" target=\"_blank\">CVE-2013-0156<\/a> : A type casting issue existed in Ruby on Rails&#8217; handling of XML parameters. This issue was addressed by disabling XML parameters in the Rails implementation used by Podcast Producer Server.<\/li>\n<li>Available for\u00a0<strong>OS X Lion Server v10.7 to v10.7.5:\u00a0<\/strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0333\" target=\"_blank\">CVE-2013-0333<\/a> :\u00a0A type casting issue existed in Ruby on Rails&#8217; handling of JSON data. This issue was addressed by switching to using the JSONGem backend for JSON parsing in the Rails implementation used by Podcast Producer Server.<\/li>\n<li>Available for\u00a0<strong>Mac OS X Lion Server v10.7 to v10.7.5:\u00a0<\/strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0156\" target=\"_blank\">CVE-2013-0156<\/a> : A type casting issue existed in Ruby on Rails&#8217; handling of XML parameters. This issue was addressed by disabling XML parameters in the Rails implementation used by Profile Manager.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-3756\" target=\"_blank\">CVE-2012-3756<\/a> :\u00a0A buffer overflow existed in the handling of &#8216;rnet&#8217; boxes in MP4 files. This issue was addressed through improved bounds checking.<\/li>\n<li>Available for\u00a0<strong>Mac OS X Server 10.6.8:\u00a0<\/strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0156\" target=\"_blank\">CVE-2013-0156<\/a> : A type casting issue existed in Ruby on Rails&#8217; handling of XML parameters. This issue was addressed by disabling YAML and symbols in XML parameters in Rails.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0973\" target=\"_blank\">CVE-2013-0973<\/a> :\u00a0Software Update allowed a man in the middle attacker to insert plugin content into the marketing text displayed for updates. This may allow the exploitation of a vulnerable plugin, or facilitate social engineering attacks involving plugins. This issue does not affect OS X Mountain Lion systems. This issue was addressed by preventing plugins from being loaded in Software Update&#8217;s marketing text WebView.<\/li>\n<li>Available for\u00a0<strong>OS X Lion Server v10.7 to v10.7.5:\u00a0<\/strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0156\" target=\"_blank\">CVE-2013-0156<\/a> : A type casting issue existed in Ruby on Rails&#8217; handling of XML parameters. This issue was addressed by disabling XML parameters in the Rails implementation used by Wiki Server.<\/li>\n<li>Available for\u00a0<strong>OS X Lion Server v10.7 to v10.7.5:\u00a0<\/strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0333\" target=\"_blank\">CVE-2013-0333<\/a> : A type casting issue existed in Ruby on Rails&#8217; handling of JSON data. This issue was addressed by switching to using the JSONGem backend for JSON parsing in the Rails implementation used by Wiki Server.<\/li>\n<\/ul>\n<p>Following are the remaining flaws fixed with Apple&#8217;s Mountain Lion update and Security Update 2013-001:<\/p>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0966\" target=\"_blank\">CVE-2013-0966<\/a> :\u00a0A canonicalization issue existed in the handling of URIs with ignorable Unicode character sequences. This issue was addressed by updating mod_hfs_apple to forbid access to URIs with ignorable Unicode character sequences.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0967\" target=\"_blank\">CVE-2013-0967<\/a> :\u00a0Java Web Start applications would run even if the Java plug-in was disabled. This issue was addressed by removing JNLP files from the CoreTypes safe file type list, so the Web Start application will not be run unless the user opens it in the Downloads directory.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-3058\" target=\"_blank\">CVE-2011-3058<\/a> :\u00a0A canonicalization issue existed in the handling of the EUC-JP encoding, which could lead to a cross-site scripting attack on EUC-JP encoded websites. This issue was addressed by updating the EUC-JP mapping table.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0963\" target=\"_blank\">CVE-2013-0963<\/a> :\u00a0An error handling issue existed in Identity Services. If the user&#8217;s AppleID certificate failed to validate, the user&#8217;s AppleID was assumed to be the empty string. If multiple systems belonging to different users enter this state, applications relying on this identity determination may erroneously extend trust. This issue was addressed by ensuring that NULL is returned instead of an empty string.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-3749\" target=\"_blank\">CVE-2012-3749<\/a> :\u00a0An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection.\u00a0This issue was addressed by unsliding the addresses before returning them.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0969\" target=\"_blank\">CVE-2013-0969<\/a> :\u00a0A logic error existed in VoiceOver&#8217;s handling of the Login Window, whereby an attacker with access to the keyboard could launch System Preferences and modify the system configuration. This issue was addressed by preventing VoiceOver from launching applications at the Login Window.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0970\" target=\"_blank\">CVE-2013-0970<\/a> :\u00a0Clicking on a specifically-formatted FaceTime:\/\/ URL in Messages could bypass the standard confirmation prompt. This issue was addressed by additional validation of FaceTime:\/\/ URLs.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-3488\" target=\"_blank\">CVE-2012-3488<\/a> : The libxslt support in contrib\/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-3489\" target=\"_blank\">CVE-2012-3489<\/a> : The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.<\/li>\n<\/ul>\n<p>Head over to Apple\u2019s support page for more information <a href=\"http:\/\/support.apple.com\/kb\/HT5612\" target=\"_blank\">about the OS X Mountain Lion v10.8.3 update<\/a>, which includes additional information about Safari 6.0.3, too. We strongly encourage all Mac users to download and install all security updates as soon as possible \u2013 it is an essential layer of security that keeps your digital life secure.<\/p>\n<p>You can update through Apple\u2019s Software Update tool by choosing <strong>Apple menu &gt; Software Update<\/strong> when ready to install. For OS X Mountain Lion v10.8.2 users, you can <a href=\"http:\/\/support.apple.com\/kb\/DL1641\" target=\"_blank\">download the 540.46 MB update to v10.8.3<\/a> from the Apple support page. For those running OS X 10.8, you can upgrade by <a href=\"http:\/\/support.apple.com\/kb\/DL1640\" target=\"_blank\">downloading the 793.69 MB Combo updater<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, Apple released a new version of its OS X Mountain Lion operating system to Mac OS X 10.8.3. This update includes multiple bug fixes and improves the security of Mac OS X. Included with Mac OS X 10.8.3 are\u00a0Safari 6.0.3 and Security Update 2013-001, both of which address multiple security problems. For Mac [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":8761,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,80,168,166,115,253,201],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last week, Apple released a new version of its OS X Mountain Lion operating system to Mac OS X 10.8.3. This update includes multiple bug fixes and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mac OS X 10.8.3 Released with Apple\u2019s Security Update 2013-001 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last week, Apple released a new version of its OS X Mountain Lion operating system to Mac OS X 10.8.3. This update includes multiple bug fixes and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-18T20:29:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-04-23T21:09:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/SecurityUpdate.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/SecurityUpdate.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/SecurityUpdate.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Apple security updates\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/\",\"name\":\"Mac OS X 10.8.3 Released with Apple\\u2019s Security Update 2013-001 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#primaryimage\"},\"datePublished\":\"2013-03-18T20:29:43+00:00\",\"dateModified\":\"2014-04-23T21:09:48+00:00\",\"description\":\"Last week, Apple released a new version of its OS X Mountain Lion operating system to Mac OS X 10.8.3. This update includes multiple bug fixes and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mac OS X 10.8.3 Released with Apple\\u2019s Security Update 2013-001\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Mac OS X 10.8.3 Released with Apple\\u2019s Security Update 2013-001\",\"datePublished\":\"2013-03-18T20:29:43+00:00\",\"dateModified\":\"2014-04-23T21:09:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#webpage\"},\"wordCount\":1215,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/SecurityUpdate.jpg\",\"keywords\":[\"Apple\",\"Mac OS X\",\"OS X\",\"OS X Mountain Lion\",\"Safari\",\"Security Update 2013-001\",\"Security Updates\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last week, Apple released a new version of its OS X Mountain Lion operating system to Mac OS X 10.8.3. This update includes multiple bug fixes and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/","og_locale":"en_US","og_type":"article","og_title":"Mac OS X 10.8.3 Released with Apple\u2019s Security Update 2013-001 - The Mac Security Blog","og_description":"Last week, Apple released a new version of its OS X Mountain Lion operating system to Mac OS X 10.8.3. This update includes multiple bug fixes and","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-18T20:29:43+00:00","article_modified_time":"2014-04-23T21:09:48+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/SecurityUpdate.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/SecurityUpdate.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/SecurityUpdate.jpg","width":"400","height":"260","caption":"Apple security updates"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/","name":"Mac OS X 10.8.3 Released with Apple\u2019s Security Update 2013-001 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#primaryimage"},"datePublished":"2013-03-18T20:29:43+00:00","dateModified":"2014-04-23T21:09:48+00:00","description":"Last week, Apple released a new version of its OS X Mountain Lion operating system to Mac OS X 10.8.3. This update includes multiple bug fixes and","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mac OS X 10.8.3 Released with Apple\u2019s Security Update 2013-001"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Mac OS X 10.8.3 Released with Apple\u2019s Security Update 2013-001","datePublished":"2013-03-18T20:29:43+00:00","dateModified":"2014-04-23T21:09:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#webpage"},"wordCount":1215,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/SecurityUpdate.jpg","keywords":["Apple","Mac OS X","OS X","OS X Mountain Lion","Safari","Security Update 2013-001","Security Updates"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/SecurityUpdate.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-38h","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12045"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=12045"}],"version-history":[{"count":46,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12045\/revisions"}],"predecessor-version":[{"id":24982,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12045\/revisions\/24982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8761"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=12045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=12045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=12045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}