{"id":23314,"date":"2014-03-11T09:37:50","date_gmt":"2014-03-11T16:37:50","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=23314"},"modified":"2014-03-11T09:37:50","modified_gmt":"2014-03-11T16:37:50","slug":"apple-tv-6-1-update-fixes-31-security-flaws","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/","title":{"rendered":"Apple TV 6.1 Update Fixes 31 Security Flaws"},"content":{"rendered":"<p>Yesterday, Apple released Apple TV 6.1 with fixes for 31 security flaws. This software update is available for\u00a0Apple TV (2nd generation and later).<\/p>\n<p>This software <a title=\"About the security content of Apple TV 6.1\" href=\"http:\/\/support.apple.com\/kb\/HT6163\" target=\"_blank\">update<\/a> addresses the following vulnerabilities:<\/p>\n<div>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1279\" target=\"_blank\">CVE-2014-1279<\/a> :\u00a0An attacker with access to an Apple TV may access sensitive\u00a0user information from logs.\u00a0Sensitive user information was logged. This issue was\u00a0addressed by logging less information.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1267\" target=\"_blank\">CVE-2014-1267<\/a> :\u00a0Profile expiration dates were not honored.\u00a0Expiration dates of mobile configuration profiles were\u00a0not evaluated correctly. The issue was resolved through improved\u00a0handling of configuration profiles.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1271\" target=\"_blank\">CVE-2014-1271<\/a> :\u00a0A malicious application can cause an unexpected system\u00a0termination.\u00a0A reachable assertion issue existed in CoreCapture&#8217;s\u00a0handling of IOKit API calls. The issue was addressed through\u00a0additional validation of input from IOKit.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1272\" target=\"_blank\">CVE-2014-1272<\/a> :\u00a0A local user may be able to change permissions on arbitrary\u00a0files.\u00a0CrashHouseKeeping followed symbolic links while\u00a0changing permissions on files. This issue was addressed by not\u00a0following symbolic links when changing permissions on files.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1273\" target=\"_blank\">CVE-2014-1273<\/a> :\u00a0Code signing requirements may be bypassed.\u00a0Text relocation instructions in dynamic libraries may\u00a0be loaded by dyld without code signature validation. This issue was\u00a0addressed by ignoring text relocation instructions.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1275\" target=\"_blank\">CVE-2014-1275<\/a> :\u00a0Viewing a maliciously crafted PDF file may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0A buffer overflow existed in the handling of JPEG2000\u00a0images in PDF files. This issue was addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2088\" target=\"_blank\">CVE-2012-2088<\/a> :\u00a0Viewing a maliciously crafted TIFF file may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0A buffer overflow existed in libtiff&#8217;s handling of TIFF\u00a0images. This issue was addressed through additional validation of\u00a0TIFF images.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6629\" target=\"_blank\">CVE-2013-6629<\/a> :\u00a0Viewing a maliciously crafted JPEG file may lead to the\u00a0disclosure of memory contents.\u00a0An uninitialized memory access issue existed in\u00a0libjpeg&#8217;s handling of JPEG markers, resulting in the disclosure of\u00a0memory contents. This issue was addressed through additional\u00a0validation of JPEG files.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1278\" target=\"_blank\">CVE-2014-1278<\/a> :\u00a0A local user may be able to cause an unexpected system\u00a0termination or arbitrary code execution in the kernel.\u00a0An out of bounds memory access issue existed in the ARM\u00a0ptmx_get_ioctl function. This issue was addressed through improved\u00a0bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1282\" target=\"_blank\">CVE-2014-1282<\/a> :\u00a0A configuration profile may be hidden from the user.\u00a0A configuration profile with a long name could be\u00a0loaded onto the device but was not displayed in the profile UI. The\u00a0issue was addressed through improved handling of profile names.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1287\" target=\"_blank\">CVE-2014-1287<\/a> :\u00a0A person with physical access to the device may be able to\u00a0cause arbitrary code execution in kernel mode.\u00a0A memory corruption issue existed in the handling of\u00a0USB messages. This issue was addressed through additional validation\u00a0of USB messages.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2909\" target=\"_blank\">CVE-2013-2909<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2926\" target=\"_blank\">CVE-2013-2926<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2928\" target=\"_blank\">CVE-2013-2928<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5196\" target=\"_blank\">CVE-2013-5196<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5197\" target=\"_blank\">CVE-2013-5197<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5198\" target=\"_blank\">CVE-2013-5198<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5199\" target=\"_blank\">CVE-2013-5199<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5225\" target=\"_blank\">CVE-2013-5225<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5228\" target=\"_blank\">CVE-2013-5228<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6625\" target=\"_blank\">CVE-2013-6625<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6635\" target=\"_blank\">CVE-2013-6635<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1269\" target=\"_blank\">CVE-2014-1269<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1270\" target=\"_blank\">CVE-2014-1270<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1289\" target=\"_blank\">CVE-2014-1289<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1290\" target=\"_blank\">CVE-2014-1290<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1291\" target=\"_blank\">CVE-2014-1291<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1292\" target=\"_blank\">CVE-2014-1292<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1293\" target=\"_blank\">CVE-2014-1293<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1294\" target=\"_blank\">CVE-2014-1294<\/a> :\u00a0Visiting a maliciously crafted website may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0Multiple memory corruption issues existed in WebKit.\u00a0These issues were addressed through improved memory handling.<\/li>\n<\/ul>\n<\/div>\n<p>Users can download the software update by turning on your Apple TV, then go to Settings &gt; General &gt; Update Software.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday, Apple released Apple TV 6.1 with fixes for 31 security flaws. This software update is available for\u00a0Apple TV (2nd generation and later). This software update addresses the following vulnerabilities: CVE-2014-1279 :\u00a0An attacker with access to an Apple TV may access sensitive\u00a0user information from logs.\u00a0Sensitive user information was logged. This issue was\u00a0addressed by logging less [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":8813,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,910,261],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Yesterday, Apple released Apple TV 6.1 with fixes for 31 security flaws. This software update is available for\u00a0Apple TV (2nd generation and later). This\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple TV 6.1 Update Fixes 31 Security Flaws - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Yesterday, Apple released Apple TV 6.1 with fixes for 31 security flaws. This software update is available for\u00a0Apple TV (2nd generation and later). This\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-11T16:37:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/\",\"name\":\"Apple TV 6.1 Update Fixes 31 Security Flaws - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#primaryimage\"},\"datePublished\":\"2014-03-11T16:37:50+00:00\",\"dateModified\":\"2014-03-11T16:37:50+00:00\",\"description\":\"Yesterday, Apple released Apple TV 6.1 with fixes for 31 security flaws. This software update is available for\\u00a0Apple TV (2nd generation and later). This\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple TV 6.1 Update Fixes 31 Security Flaws\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple TV 6.1 Update Fixes 31 Security Flaws\",\"datePublished\":\"2014-03-11T16:37:50+00:00\",\"dateModified\":\"2014-03-11T16:37:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#webpage\"},\"wordCount\":538,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"keywords\":[\"Apple\",\"Apple TV 6.1\",\"Bug Fixes\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Yesterday, Apple released Apple TV 6.1 with fixes for 31 security flaws. This software update is available for\u00a0Apple TV (2nd generation and later). This","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/","og_locale":"en_US","og_type":"article","og_title":"Apple TV 6.1 Update Fixes 31 Security Flaws - The Mac Security Blog","og_description":"Yesterday, Apple released Apple TV 6.1 with fixes for 31 security flaws. This software update is available for\u00a0Apple TV (2nd generation and later). This","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-03-11T16:37:50+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/","name":"Apple TV 6.1 Update Fixes 31 Security Flaws - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#primaryimage"},"datePublished":"2014-03-11T16:37:50+00:00","dateModified":"2014-03-11T16:37:50+00:00","description":"Yesterday, Apple released Apple TV 6.1 with fixes for 31 security flaws. This software update is available for\u00a0Apple TV (2nd generation and later). This","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple TV 6.1 Update Fixes 31 Security Flaws"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple TV 6.1 Update Fixes 31 Security Flaws","datePublished":"2014-03-11T16:37:50+00:00","dateModified":"2014-03-11T16:37:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#webpage"},"wordCount":538,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","keywords":["Apple","Apple TV 6.1","Bug Fixes"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-tv-6-1-update-fixes-31-security-flaws\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-642","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/23314"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=23314"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/23314\/revisions"}],"predecessor-version":[{"id":23419,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/23314\/revisions\/23419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8813"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=23314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=23314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=23314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}