	{"id":18339,"date":"2013-09-25T14:39:47","date_gmt":"2013-09-25T21:39:47","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=18339"},"modified":"2016-10-06T12:35:42","modified_gmt":"2016-10-06T19:35:42","slug":"apple-releases-apple-tv-6-0-with-57-bug-fixes","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/","title":{"rendered":"Apple Releases Apple TV 6.0 with 57 Bug Fixes"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/11\/Apple-tv.jpg\"><img loading=\"lazy\" class=\"size-full wp-image-2183 alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/11\/Apple-tv.jpg\" alt=\"Apple-tv\" width=\"108\" height=\"109\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/11\/Apple-tv.jpg 108w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/11\/Apple-tv-100x100.jpg 100w\" sizes=\"(max-width: 108px) 100vw, 108px\" \/><\/a>After <a href=\"http:\/\/www.tuaw.com\/2013\/09\/22\/apple-pulls-apple-tv-6-0-update\/\" target=\"_blank\">fumbling its first attempt<\/a> at launching Apple TV 6.0 last week, Apple has re-released the digital media receiver with patches for 57 bugs. Available for Apple TV 2<sup>nd<\/sup>\u00a0generation and later, this is Apple&#8217;s first security update for the product\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-security-updates-for-apple-tv\/\" target=\"_blank\">since March<\/a>.<\/p>\n<p>This update comes with the usual fixes for vulnerabilities that may lead to unexpected application termination or arbitrary code execution, some of which occur from viewing maliciously crafted PDF files (due to buffer overflow issues that existed in the handling of JPEG2000 encoded data and\u00a0JBIG2 encoded data in PDF files.) Other critical fixes relate to\u00a0kernel issues that may result in arbitrary code execution within the kernel or allow information disclosure.<\/p>\n<p>Following is list of all vulnerabilities <a href=\"http:\/\/support.apple.com\/kb\/HT5935\" target=\"_blank\">patched<\/a> with the Apple TV 6.0 update:<\/p>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1025\" target=\"_blank\">CVE-2013-1025<\/a> :\u00a0Buffer overflow in CoreGraphics in Apple Mac OS X before 10.8.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JBIG2 data in a PDF document.\u00a0This issue was addressed through additional bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1019\" target=\"_blank\">CVE-2013-1019<\/a> :\u00a0Buffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with Sorenson encoding.\u00a0This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5134\" target=\"_blank\">CVE-2013-5134<\/a> :\u00a0An attacker with a privileged network position may intercept user credentials or other sensitive information.\u00a0TrustWave, a trusted root CA, has issued, and subsequently revoked, a sub-CA certificate from one of its trusted anchors. This sub-CA facilitated the interception of communications secured by Transport Layer Security (TLS). This update added the involved sub-CA certificate to OS X&#8217;s list of untrusted certificates.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-3950\" target=\"_blank\">CVE-2013-3950<\/a> :\u00a0Stack-based buffer overflow in the openSharedCacheFile function in dyld.cpp in dyld in Apple iOS 5.1.x and 6.x through 6.1.3 makes it easier for attackers to conduct untethering attacks via a long string in the DYLD_SHARED_CACHE_DIR environment variable.\u00a0These issues were addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1026\" target=\"_blank\">CVE-2013-1026<\/a> :\u00a0Buffer overflow in ImageIO in Apple Mac OS X before 10.8.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JPEG2000 data in a PDF document.\u00a0This issue was addressed through additional bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5138\" target=\"_blank\">CVE-2013-5138<\/a> :\u00a0A malicious local application could cause an unexpected system termination.\u00a0A null pointer dereference existed in IOCatalogue. The issue was addressed through additional type checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5139\" target=\"_blank\">CVE-2013-5139<\/a> :\u00a0Executing a malicious application may result in arbitrary code execution within the kernel.\u00a0An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5140\" target=\"_blank\">CVE-2013-5140<\/a> :\u00a0A remote attacker can cause a device to unexpectedly restart.\u00a0Sending an invalid packet fragment to a device can cause a kernel assert to trigger, leading to a device restart. The issue was addressed through additional validation of packet fragments.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-2391\" target=\"_blank\">CVE-2011-2391<\/a> :\u00a0An attacker on a local network can cause a denial of service.\u00a0An attacker on a local network can send specially crafted IPv6 ICMP packets and cause high CPU load. The issue was addressed by rate limiting ICMP packets before verifying their checksum.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5142\" target=\"_blank\">CVE-2013-5142<\/a> :\u00a0Kernel stack memory may be disclosed to local users.\u00a0An information disclosure issue existed in the msgctl and segctl APIs. This issue was addressed by initializing data structures returned from the kernel.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-3953\" target=\"_blank\">CVE-2013-3953<\/a> :\u00a0The mach_port_space_info function in osfmk\/ipc\/mach_debug.c in the XNU kernel in Apple Mac OS X 10.8.x does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted call.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-3954\" target=\"_blank\">CVE-2013-3954<\/a> :\u00a0The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not properly validate the data for file actions and port actions, which allows local users to (1) cause a denial of service (panic) via a size value that is inconsistent with a header count field, or (2) obtain sensitive information from kernel heap memory via a certain size value in conjunction with a crafted buffer.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5145\" target=\"_blank\">CVE-2013-5145<\/a> :\u00a0An unauthorized process may modify the set of loaded kernel extensions.\u00a0An issue existed in kextd&#8217;s handling of IPC messages from unauthenticated senders. This issue was addressed by adding additional authorization checks.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-3102\" target=\"_blank\">CVE-2011-3102<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-0841\" target=\"_blank\">CVE-2012-0841<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2807\" target=\"_blank\">CVE-2012-2807<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-5134\" target=\"_blank\">CVE-2012-5134<\/a> :\u00a0Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution.\u00a0Multiple memory corruption issues existed in libxml. These issues were addressed by updating libxml to version 2.9.0.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2825\" target=\"_blank\">CVE-2012-2825<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2870\" target=\"_blank\">CVE-2012-2870<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2871\" target=\"_blank\">CVE-2012-2871<\/a> :\u00a0Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution.\u00a0Multiple memory corruption issues existed in libxslt. These issues were addressed by updating libxslt to version 1.1.28.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0879\" target=\"_blank\">CVE-2013-0879<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0991\" target=\"_blank\">CVE-2013-0991<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0992\" target=\"_blank\">CVE-2013-0992<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0993\" target=\"_blank\">CVE-2013-0993<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0994\" target=\"_blank\">CVE-2013-0994<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0995\" target=\"_blank\">CVE-2013-0995<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0996\" target=\"_blank\">CVE-2013-0996<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0997\" target=\"_blank\">CVE-2013-0997<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0998\" target=\"_blank\">CVE-2013-0998<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0999\" target=\"_blank\">CVE-2013-0999<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1000\" target=\"_blank\">CVE-2013-1000<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1001\" target=\"_blank\">CVE-2013-1001<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1002\" target=\"_blank\">CVE-2013-1002<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1003\" target=\"_blank\">CVE-2013-1003<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1004\" target=\"_blank\">CVE-2013-1004<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1005\" target=\"_blank\">CVE-2013-1005<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1006\" target=\"_blank\">CVE-2013-1006<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1007\" target=\"_blank\">CVE-2013-1007<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1008\" target=\"_blank\">CVE-2013-1008<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1010\" target=\"_blank\">CVE-2013-1010<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1011\" target=\"_blank\">CVE-2013-1011<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1037\" target=\"_blank\">CVE-2013-1037<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1038\" target=\"_blank\">CVE-2013-1038<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1039\" target=\"_blank\">CVE-2013-1039<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1040\" target=\"_blank\">CVE-2013-1040<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1041\" target=\"_blank\">CVE-2013-1041<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1042\" target=\"_blank\">CVE-2013-1042<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1043\" target=\"_blank\">CVE-2013-1043<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1044\" target=\"_blank\">CVE-2013-1044<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1045\" target=\"_blank\">CVE-2013-1045<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1046\" target=\"_blank\">CVE-2013-1046<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1047\" target=\"_blank\">CVE-2013-1047<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2842\" target=\"_blank\">CVE-2013-2842<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5125\" target=\"_blank\">CVE-2013-5125<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5126\" target=\"_blank\">CVE-2013-5126<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5127\" target=\"_blank\">CVE-2013-5127<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5128\" target=\"_blank\">CVE-2013-5128<\/a> :\u00a0Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.\u00a0Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.<\/li>\n<\/ul>\n<p>Users can download the software update by turning on your Apple TV, then go to Settings &gt; General &gt; Update Software.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After fumbling its first attempt at launching Apple TV 6.0 last week, Apple has re-released the digital media receiver with patches for 57 bugs. Available for Apple TV 2nd\u00a0generation and later, this is Apple&#8217;s first security update for the product\u00a0since March. This update comes with the usual fixes for vulnerabilities that may lead to unexpected [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":8813,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[655,3151,24,261],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"After fumbling its first attempt at launching Apple TV 6.0 last week, Apple has re-released the digital media receiver with patches for 57 bugs. Available\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Releases Apple TV 6.0 with 57 Bug Fixes - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"After fumbling its first attempt at launching Apple TV 6.0 last week, Apple has re-released the digital media receiver with patches for 57 bugs. Available\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-25T21:39:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T19:35:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/\",\"name\":\"Apple Releases Apple TV 6.0 with 57 Bug Fixes - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#primaryimage\"},\"datePublished\":\"2013-09-25T21:39:47+00:00\",\"dateModified\":\"2016-10-06T19:35:42+00:00\",\"description\":\"After fumbling its first attempt at launching Apple TV 6.0 last week, Apple has re-released the digital media receiver with patches for 57 bugs. Available\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Releases Apple TV 6.0 with 57 Bug Fixes\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple Releases Apple TV 6.0 with 57 Bug Fixes\",\"datePublished\":\"2013-09-25T21:39:47+00:00\",\"dateModified\":\"2016-10-06T19:35:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#webpage\"},\"wordCount\":910,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"keywords\":[\"6.0\",\"Apple\",\"Apple TV\",\"Bug Fixes\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"After fumbling its first attempt at launching Apple TV 6.0 last week, Apple has re-released the digital media receiver with patches for 57 bugs. Available","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/","og_locale":"en_US","og_type":"article","og_title":"Apple Releases Apple TV 6.0 with 57 Bug Fixes - The Mac Security Blog","og_description":"After fumbling its first attempt at launching Apple TV 6.0 last week, Apple has re-released the digital media receiver with patches for 57 bugs. Available","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-09-25T21:39:47+00:00","article_modified_time":"2016-10-06T19:35:42+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/","name":"Apple Releases Apple TV 6.0 with 57 Bug Fixes - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#primaryimage"},"datePublished":"2013-09-25T21:39:47+00:00","dateModified":"2016-10-06T19:35:42+00:00","description":"After fumbling its first attempt at launching Apple TV 6.0 last week, Apple has re-released the digital media receiver with patches for 57 bugs. Available","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Releases Apple TV 6.0 with 57 Bug Fixes"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple Releases Apple TV 6.0 with 57 Bug Fixes","datePublished":"2013-09-25T21:39:47+00:00","dateModified":"2016-10-06T19:35:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#webpage"},"wordCount":910,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","keywords":["6.0","Apple","Apple TV","Bug Fixes"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-0-with-57-bug-fixes\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4LN","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/18339"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=18339"}],"version-history":[{"count":27,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/18339\/revisions"}],"predecessor-version":[{"id":58060,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/18339\/revisions\/58060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8813"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=18339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=18339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=18339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}