	{"id":22447,"date":"2014-02-25T13:25:35","date_gmt":"2014-02-25T21:25:35","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=22447"},"modified":"2016-10-06T12:38:10","modified_gmt":"2016-10-06T19:38:10","slug":"apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/","title":{"rendered":"Apple&#8217;s OS X Mavericks 10.9.2 Update Fixes SSL Bug"},"content":{"rendered":"<p>Apple has just released OS X Mavericks 10.9.2 with fixes for an SSL bug that was patched on\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-major-data-security-flaw-with-ios-update\/\" target=\"_blank\">iOS<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-0-2-update-fixes-ssl-flaw\/\" target=\"_blank\">Apple TV<\/a>\u00a0last week. Weighing in at 859.7 MB, the Mac OS X 10.9.2 update is fairly substantial &#8211; offering fixes and improvements across the board. Apple also released Security Update 2014-001, which addresses multiple OS X vulnerabilities, as is normal for major operating system updates.<\/p>\n<p>These updates are available for: OS X Lion Server 10.7.5, Mac OS X 10.7.5, 10.8.5, 10.9 and 10.9.1.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/os-x-mavericks-10-9-2-update\/\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-22449\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/OS-X-Mavericks-10.9.2-Update.png\" alt=\"Mac OS X 10.9.2 update\" width=\"600\" height=\"345\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/OS-X-Mavericks-10.9.2-Update.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/OS-X-Mavericks-10.9.2-Update-150x86.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/OS-X-Mavericks-10.9.2-Update-300x172.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Perhaps most importantly, Security Update 2014-001 fixes a serious SSL bug (CVE-2014-1266)\u00a0that concerns data security. The SSL flaw allows an attacker to intercept and decrypt SSL\/TLS communications, which is, as Larry Seltzer noted at <a href=\"http:\/\/www.zdnet.com\/apple-and-the-ssltls-bug-open-questions-7000026628\/\" target=\"_blank\">ZDNet<\/a>, &#8220;probably the most important security protocol there is today.&#8221;<\/p>\n<p>Altogether, the OS X security update fixes multiple vulnerabilities in Apache, the most serious of which may lead to cross-site scripting, it patches issues that allow the App Sandbox to be bypassed, resolves a number of bugs related to arbitrary code execution, and addresses a problem that may lead to the disclosure of memory contents when viewing maliciously crafted JPEG files, among a slew of other bug fixes.\u00a0Root certificates have been updated as well; the complete list of recognized system roots may be viewed via the Keychain Access application.<\/p>\n<p>Apple provided the following descriptions of all vulnerabilities resolved in this update:<\/p>\n<div>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1862\" target=\"_blank\">CVE-2013-1862<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1896\" target=\"_blank\">CVE-2013-1896<\/a> :\u00a0Multiple vulnerabilities existed in Apache, the most\u00a0serious of which may lead to cross-site scripting. These issues were\u00a0addressed by updating Apache to version 2.2.26.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5179\" target=\"_blank\">CVE-2013-5179<\/a> :\u00a0The LaunchServices interface for launching an\u00a0application allowed sandboxed apps to specify the list of arguments\u00a0passed to the new process. A compromised sandboxed application could\u00a0abuse this to bypass the sandbox. This issue was addressed by\u00a0preventing sandboxed applications from specifying arguments. This\u00a0issue does not affect systems running OS X Mavericks 10.9 or later.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1254\" target=\"_blank\">CVE-2014-1254<\/a> :\u00a0A memory corruption issue existed in the handling of\u00a0handling of Type 1 fonts. This issue was addressed through improved\u00a0bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1262\" target=\"_blank\">CVE-2014-1262<\/a> :\u00a0A memory corruption issue existed in the handling of\u00a0Mach messages passed to ATS. This issue was addressed through\u00a0improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1255\" target=\"_blank\">CVE-2014-1255<\/a> :\u00a0An arbitrary free issue existed in the handling of Mach\u00a0messages passed to ATS. This issue was addressed through additional\u00a0validation of Mach messages.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1256\" target=\"_blank\">CVE-2014-1256<\/a> :\u00a0A buffer overflow issue existed in the handling of Mach\u00a0messages passed to ATS. This issue was addressed by additional bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1257\" target=\"_blank\">CVE-2014-1257<\/a> :\u00a0Resetting Safari did not always delete session cookies\u00a0until Safari was closed. This issue was addressed through improved\u00a0handling of session cookies. This issue does not affect systems\u00a0running OS X Mavericks 10.9 or later.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1258\" target=\"_blank\">CVE-2014-1258<\/a> :\u00a0A heap buffer overflow existed in CoreAnimation&#8217;s\u00a0handling of images. This issue was addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1261\" target=\"_blank\">CVE-2014-1261<\/a> :\u00a0A signedness issue existed in CoreText in the handling\u00a0of Unicode fonts. This issue is addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1263\" target=\"_blank\">CVE-2014-1263<\/a> : When using curl to connect to an HTTPS URL containing\u00a0an IP address, the IP address was not validated against the\u00a0certificate. This issue does not affect systems prior to OS X\u00a0Mavericks v10.9.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1266\" target=\"_blank\">CVE-2014-1266<\/a> :\u00a0Secure Transport failed to validate the authenticity of\u00a0the connection. This issue was addressed by restoring missing\u00a0validation steps.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1265\" target=\"_blank\">CVE-2014-1265<\/a> :\u00a0An unprivileged user may change the system clock.\u00a0This update changes the behavior of the system setup\u00a0command to require administrator privileges to change the system\u00a0clock.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1259\" target=\"_blank\">CVE-2014-1259<\/a> :\u00a0A buffer overflow existed in the handling of file\u00a0names. This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1264\" target=\"_blank\">CVE-2014-1264<\/a> :\u00a0Accessing a file&#8217;s ACL via Finder may corrupt the ACLs\u00a0on the file. This issue was addressed through improved handling of\u00a0ACLs.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6629\" target=\"_blank\">CVE-2013-6629<\/a> :\u00a0An uninitialized memory access issue existed in\u00a0libjpeg&#8217;s handling of JPEG markers, resulting in the disclosure of\u00a0memory contents. This issue was addressed by better JPEG handling.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5139\" target=\"_blank\">CVE-2013-5139<\/a> :\u00a0An out of bounds array access existed in the\u00a0IOSerialFamily driver. This issue was addressed through additional\u00a0bounds checking. This issue does not affect systems running OS X\u00a0Mavericks v10.9 or later.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5178\" target=\"_blank\">CVE-2013-5178<\/a> :\u00a0An issue existed in the handling of certain unicode\u00a0characters that could allow filenames to show incorrect extensions.\u00a0The issue was addressed by filtering unsafe unicode characters from\u00a0display in filenames. This issue does not affect systems running OS X\u00a0Mavericks v10.9 or later.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5986\" target=\"_blank\">CVE-2013-5986<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5987\" target=\"_blank\">CVE-2013-5987<\/a> :\u00a0An issue existed that allowed writes to some trusted\u00a0memory on the graphics card. This issue was addressed by removing the\u00a0ability of the host to write to that memory.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-4073\" target=\"_blank\">CVE-2013-4073<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-4113\" target=\"_blank\">CVE-2013-4113<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-4248\" target=\"_blank\">CVE-2013-4248<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6420\" target=\"_blank\">CVE-2013-6420<\/a> :\u00a0Multiple vulnerabilities existed in PHP, the most\u00a0serious of which may have led to arbitrary code execution. These\u00a0issues were addressed by updating PHP to version 5.4.22 on OS X\u00a0Mavericks v10.9, and 5.3.28 on OS X Lion and Mountain Lion.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1260\" target=\"_blank\">CVE-2014-1260<\/a> :\u00a0A memory corruption issue existed in QuickLook&#8217;s\u00a0handling of Microsoft Office files. Downloading a maliciously crafted\u00a0Microsoft Office file may have led to an unexpected application\u00a0termination or arbitrary code execution. This issue does not affect\u00a0systems running OS X Mavericks 10.9 or later.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1252\" target=\"_blank\">CVE-2014-1252<\/a> :\u00a0A double free issue existed in QuickLook&#8217;s handling of\u00a0Microsoft Word documents. This issue was addressed through improved\u00a0memory management.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1246\" target=\"_blank\">CVE-2014-1246<\/a> :\u00a0A buffer overflow existed in the handling of &#8216;ftab&#8217;\u00a0atoms. This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1247\" target=\"_blank\">CVE-2014-1247<\/a> :\u00a0A memory corruption issue existed in the handling of\u00a0&#8216;dref&#8217; atoms. This issue was addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1248\" target=\"_blank\">CVE-2014-1248<\/a> :\u00a0A buffer overflow existed in the handling of &#8216;ldat&#8217;\u00a0atoms. This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1249\" target=\"_blank\">CVE-2014-1249<\/a> :\u00a0A buffer overflow existed in the handling of PSD\u00a0images. This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1250\" target=\"_blank\">CVE-2014-1250<\/a> :\u00a0An out of bounds byte swapping issue existed in the\u00a0handling of &#8216;ttfo&#8217; elements. This issue was addressed through\u00a0improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1245\" target=\"_blank\">CVE-2014-1245<\/a> :\u00a0A signedness issue existed in the handling of &#8216;stsz&#8217;\u00a0atoms. This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-3389\" target=\"_blank\">CVE-2011-3389<\/a> :\u00a0There were known attacks on the confidentiality of SSL\u00a03.0 and TLS 1.0 when a cipher suite used a block cipher in CBC mode.\u00a0To address these issues for applications using Secure Transport, the\u00a01-byte fragment mitigation was enabled by default for this\u00a0configuration.<\/li>\n<\/ul>\n<\/div>\n<div>You can update through Apple&#8217;s Software Update tool by choosing\u00a0<strong>Apple menu<\/strong>\u00a0&gt;\u00a0<strong>Software Update<\/strong>\u00a0when you&#8217;re ready to install. Additionally, you can update through Apple&#8217;s Software Downloads website, here:<\/div>\n<div>\n<ul>\n<li><a title=\"OS X Mavericks 10.9.2 Update\" href=\"http:\/\/support.apple.com\/kb\/DL1725\" target=\"_blank\">OS X Mavericks 10.9.2 Update<\/a>\u00a0(859.7 MB)<\/li>\n<li><a title=\"OS X Mavericks 10.9.2 Update (Combo)\" href=\"http:\/\/support.apple.com\/kb\/DL1726\" target=\"_blank\">OS X Mavericks 10.9.2 Update (Combo)<\/a>\u00a0(859.7 MB)<\/li>\n<li><a title=\"Security Update 2014-001 (Lion)\" href=\"http:\/\/support.apple.com\/kb\/DL1727\" target=\"_blank\">Security Update 2014-001 (Lion)<\/a>\u00a0(123.4 MB)<\/li>\n<li><a title=\"Security Update 2014-001 (Mountain Lion)\" href=\"http:\/\/support.apple.com\/kb\/DL1729\" target=\"_blank\">Security Update 2014-001 (Mountain Lion)<\/a>\u00a0(115.8 MB)<\/li>\n<li><a title=\"Security Update 2014-001 Server (Lion)\" href=\"http:\/\/support.apple.com\/kb\/DL1728\" target=\"_blank\">Security Update 2014-001 Server (Lion)<\/a>\u00a0(173.6 MB)<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Apple has just released OS X Mavericks 10.9.2 with fixes for an SSL bug that was patched on\u00a0iOS and Apple TV\u00a0last week. Weighing in at 859.7 MB, the Mac OS X 10.9.2 update is fairly substantial &#8211; offering fixes and improvements across the board. Apple also released Security Update 2014-001, which addresses multiple OS X [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":20503,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,261,877,887,168,885,879,135],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has just released OS X Mavericks 10.9.2 with fixes for an SSL bug that was patched on\u00a0iOS and Apple TV\u00a0last week. Weighing in at 859.7 MB, the Mac\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple&#039;s OS X Mavericks 10.9.2 Update Fixes SSL Bug - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has just released OS X Mavericks 10.9.2 with fixes for an SSL bug that was patched on\u00a0iOS and Apple TV\u00a0last week. Weighing in at 859.7 MB, the Mac\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-25T21:25:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T19:38:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/10\/osx-mavericks-header.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/10\/osx-mavericks-header.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/10\/osx-mavericks-header.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/\",\"name\":\"Apple's OS X Mavericks 10.9.2 Update Fixes SSL Bug - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#primaryimage\"},\"datePublished\":\"2014-02-25T21:25:35+00:00\",\"dateModified\":\"2016-10-06T19:38:10+00:00\",\"description\":\"Apple has just released OS X Mavericks 10.9.2 with fixes for an SSL bug that was patched on\\u00a0iOS and Apple TV\\u00a0last week. Weighing in at 859.7 MB, the Mac\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple&#8217;s OS X Mavericks 10.9.2 Update Fixes SSL Bug\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple&#8217;s OS X Mavericks 10.9.2 Update Fixes SSL Bug\",\"datePublished\":\"2014-02-25T21:25:35+00:00\",\"dateModified\":\"2016-10-06T19:38:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#webpage\"},\"wordCount\":1107,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/10\/osx-mavericks-header.jpg\",\"keywords\":[\"Apple\",\"Bug Fixes\",\"CVE-2014-1266\",\"Mavericks 10.9.2\",\"OS X\",\"Security Update 2014-001\",\"SSL Flaw\",\"Update\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has just released OS X Mavericks 10.9.2 with fixes for an SSL bug that was patched on\u00a0iOS and Apple TV\u00a0last week. Weighing in at 859.7 MB, the Mac","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/","og_locale":"en_US","og_type":"article","og_title":"Apple's OS X Mavericks 10.9.2 Update Fixes SSL Bug - The Mac Security Blog","og_description":"Apple has just released OS X Mavericks 10.9.2 with fixes for an SSL bug that was patched on\u00a0iOS and Apple TV\u00a0last week. Weighing in at 859.7 MB, the Mac","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-02-25T21:25:35+00:00","article_modified_time":"2016-10-06T19:38:10+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/10\/osx-mavericks-header.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/10\/osx-mavericks-header.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/10\/osx-mavericks-header.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/","name":"Apple's OS X Mavericks 10.9.2 Update Fixes SSL Bug - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#primaryimage"},"datePublished":"2014-02-25T21:25:35+00:00","dateModified":"2016-10-06T19:38:10+00:00","description":"Apple has just released OS X Mavericks 10.9.2 with fixes for an SSL bug that was patched on\u00a0iOS and Apple TV\u00a0last week. Weighing in at 859.7 MB, the Mac","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple&#8217;s OS X Mavericks 10.9.2 Update Fixes SSL Bug"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple&#8217;s OS X Mavericks 10.9.2 Update Fixes SSL Bug","datePublished":"2014-02-25T21:25:35+00:00","dateModified":"2016-10-06T19:38:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#webpage"},"wordCount":1107,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/10\/osx-mavericks-header.jpg","keywords":["Apple","Bug Fixes","CVE-2014-1266","Mavericks 10.9.2","OS X","Security Update 2014-001","SSL Flaw","Update"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-os-x-mavericks-10-9-2-update-fixes-ssl-bug\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/10\/osx-mavericks-header.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-5Q3","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/22447"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=22447"}],"version-history":[{"count":34,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/22447\/revisions"}],"predecessor-version":[{"id":58093,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/22447\/revisions\/58093"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/20503"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=22447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=22447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=22447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}