	{"id":24898,"date":"2014-04-23T12:58:23","date_gmt":"2014-04-23T19:58:23","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=24898"},"modified":"2016-10-06T12:40:44","modified_gmt":"2016-10-06T19:40:44","slug":"apple-security-update-2014-002-patches-secure-transport","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/","title":{"rendered":"Apple Security Update 2014-002 Patches Secure Transport"},"content":{"rendered":"<p>Yesterday, Apple released Security Update 2014-002\u00a0for OS X with patches for 13 vulnerabilities.<\/p>\n<p>This update is available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\u00a0OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2.<\/p>\n<p>Unfortunately, Apple has stopped releasing security updates for Snow Leopard, the 2009 edition operating system.<\/p>\n<p><strong>MORE: <a title=\"What to Do if Your Mac Can't Run OS X Mavericks\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-mac-cant-run-os-x-mavericks\/\" target=\"_blank\">What to Do if Your Mac Can&#8217;t Run OS X Mavericks<\/a>\u00a0<\/strong><\/p>\n<p>The security-only update addresses multiple security flaws, including a vulnerability in its Secure Transport\u2014Apple&#8217;s\u00a0API mechanism for making SSL or TLS connections\u2014that made it possible for &#8220;an attacker to establish two connections which had the same encryption keys and handshake, insert the attacker&#8217;s data in one connection, and renegotiate so that the connections may be forwarded to each other,&#8221;\u00a0<a title=\"Security Update 2014-002\" href=\"http:\/\/support.apple.com\/kb\/HT6207\" target=\"_blank\">Apple noted<\/a>.<\/p>\n<p>Apple&#8217;s security advisory further described its impact, saying, &#8220;An attacker with a privileged network position may capture data or change the operations performed in sessions protected by SSL.&#8221; Apple credited members of the Prosecco research team at Inria Paris for <a title=\"Triple Handshakes Considered Harmful: Breaking and Fixing Authentication over TLS\" href=\"https:\/\/secure-resumption.com\/#countermeasures\" target=\"_blank\">reporting the flaw<\/a>\u2014Antoine Delignat-Lavaud, Karthikeyan Bhargavan and\u00a0Alfredo Pironti.<\/p>\n<p>In correlation with the release of Security Update 2014-002, Apple also patched its iOS and Apple TV implementations of Secure Transport with <a title=\"iOS 7.1.1 Update Includes Bug Fixes\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-1-update-includes-bug-fixes\/\" target=\"_blank\">iOS 7.1.1<\/a> and <a title=\"Apple Releases Apple TV 6.1.1 with Security Updates\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-1-1-with-security-updates\/\" target=\"_blank\">Apple TV 6.1.1<\/a>.<\/p>\n<p>Security Update 2014-002 addresses the following vulnerabilities:<\/p>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1296\" target=\"_blank\">CVE-2014-1296<\/a> : An attacker in a privileged network position can obtain web site credentials. Set-Cookie HTTP headers would be processed even if the connection closed before the header line was complete. An attacker could strip security settings from the cookie by forcing the connection to close before the security settings were sent, and then obtain the value of the unprotected cookie. This issue was addressed by ignoring incomplete HTTP header lines.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1315\" target=\"_blank\">CVE-2014-1315<\/a> : Visiting a maliciously crafted website or URL may result in an unexpected application termination or arbitrary code execution. A format string issue existed in the handling of URLs. This issue was addressed through additional validation of URLs. This issue does not affect systems prior to OS X Mavericks.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5170\" target=\"_blank\">CVE-2013-5170<\/a> : Opening a maliciously crafted PDF file may result in an unexpected application termination or arbitrary code execution. A buffer underflow existed in the handling of fonts in PDF files. This issue was addressed through additional bounds checking. This issue does not affect OS X Mavericks systems.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1316\" target=\"_blank\">CVE-2014-1316<\/a> : A remote attacker may be able to cause a denial of service. A reachable abort existed in the handling of ASN.1 data. This issue was addressed through additional validation of ASN.1 data.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1319\" target=\"_blank\">CVE-2014-1319<\/a> : Viewing a maliciously crafted JPEG image may lead to an unexpected application termination or arbitrary code execution. A buffer overflow issue existed in ImageIO&#8217;s handling of JPEG images. This issue was addressed through improved bounds checking. This issue does not affect systems prior to OS X Mavericks.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1318\" target=\"_blank\">CVE-2014-1318<\/a> : A malicious application can take control of the system. A validation issue existed in the handling of a pointer from userspace. This issue was addressed through additional validation of pointers.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1320\" target=\"_blank\">CVE-2014-1320<\/a> : A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization. A set of kernel pointers stored in an IOKit object could be retrieved from userland. This issue was addressed through removing the pointers from the object.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1322\" target=\"_blank\">CVE-2014-1322<\/a> : A local user can read a kernel pointer, which can be used to bypass kernel address space layout randomization. A kernel pointer stored in a XNU object could be retrieved from userland. This issue was addressed through removing the pointer from the object.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1321\" target=\"_blank\">CVE-2014-1321<\/a> : The screen might not lock. If a key was pressed or the trackpad touched just after the lid was closed, the system might have tried to wake up while going to sleep, which would have caused the screen to be unlocked. This issue was addressed by ignoring keypresses while going to sleep. This issue does not affect systems prior to OS X Mavericks.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6393\" target=\"_blank\">CVE-2013-6393<\/a> : Running a Ruby script that handles untrusted YAML tags may lead to an unexpected application termination or arbitrary code execution. An integer overflow issue existed in LibYAML&#8217;s handling of YAML tags. This issue was addressed through additional validation of YAML tags. This issue does not affect systems prior to OS X.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-4164\" target=\"_blank\">CVE-2013-4164<\/a> : Running a Ruby script that uses untrusted input to create a Float object may lead to an unexpected application termination or arbitrary code execution. A heap-based buffer overflow issue existed in Ruby when converting a string to a floating point value. This issue was addressed through additional validation of floating point values.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1295\" target=\"_blank\">CVE-2014-1295<\/a> : An attacker with a privileged network position may capture data or change the operations performed in sessions protected by SSL. In a &#8216;triple handshake&#8217; attack, it was possible for an attacker to establish two connections which had the same encryption keys and handshake, insert the attacker&#8217;s data in one connection, and renegotiate so that the connections may be forwarded to each other. To prevent attacks based on this scenario, Secure Transport was changed so that, by default, a renegotiation must present the same server certificate as was presented in the original connection. This issue does not affect Mac OS X 10.7 systems and earlier.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1314\" target=\"_blank\">CVE-2014-1314<\/a> : Maliciously crafted applications can execute arbitrary code outside the sandbox. WindowServer sessions could be created by sandboxed applications. This issue was addressed by disallowing sandboxed applications from creating WindowServer sessions.<\/li>\n<\/ul>\n<p>We strongly encourage all Mac users to download and install all security updates as soon as possible \u2013 it is an essential layer of security that keeps your digital life secure.<\/p>\n<p>You can update through Apple\u2019s Software Update tool by choosing\u00a0<strong>Apple menu<\/strong>\u00a0&gt;<strong>Software Update<\/strong>\u00a0when you\u2019re ready to install, or you can\u00a0go directly to Apple\u2019s support page to download the updates from there.<\/p>\n<p>For OS X Lion Server users, you can\u00a0<a title=\"Security Update 2014-002 Server (Lion)\" href=\"http:\/\/support.apple.com\/kb\/DL1739\" target=\"_blank\">go here to download<\/a>\u00a0the 177.2 MB update.<\/p>\n<p>OS X Lion users can\u00a0<a title=\"Security Update 2014-002 (Lion)\" href=\"http:\/\/support.apple.com\/kb\/DL1738\" target=\"_blank\">go here to download<\/a>\u00a0the 126.9 MB update.<\/p>\n<p>OS X Mountain Lion users can <a title=\"Security Update 2014-002 (Mountain Lion)\" href=\"http:\/\/support.apple.com\/kb\/DL1737\" target=\"_blank\">go here to download<\/a> the 135.9 MB update.<\/p>\n<p>OS X Mavericks users can <a title=\"Security Update 2014-002 Mavericks\" href=\"http:\/\/support.apple.com\/kb\/DL1740\" target=\"_blank\">go here to download<\/a> the 80.5 MB update; this update also includes <a title=\"Apple Quietly Releases Safari 6.1.3 and Safari 7.0.3\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-quietly-releases-safari-6-1-3-and-safari-7-0-3\/\" target=\"_blank\">Safari 7.0.3<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday, Apple released Security Update 2014-002\u00a0for OS X with patches for 13 vulnerabilities. This update is available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\u00a0OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2. Unfortunately, Apple has stopped releasing security updates for Snow Leopard, the 2009 edition operating system. MORE: What to Do if [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":8813,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,261,976,973],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Yesterday, Apple released Security Update 2014-002\u00a0for OS X with patches for 13 vulnerabilities. This update is available for: OS X Lion v10.7.5, OS X\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Security Update 2014-002 Patches Secure Transport - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Yesterday, Apple released Security Update 2014-002\u00a0for OS X with patches for 13 vulnerabilities. This update is available for: OS X Lion v10.7.5, OS X\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-23T19:58:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T19:40:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/\",\"name\":\"Apple Security Update 2014-002 Patches Secure Transport - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#primaryimage\"},\"datePublished\":\"2014-04-23T19:58:23+00:00\",\"dateModified\":\"2016-10-06T19:40:44+00:00\",\"description\":\"Yesterday, Apple released Security Update 2014-002\\u00a0for OS X with patches for 13 vulnerabilities. This update is available for: OS X Lion v10.7.5, OS X\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Security Update 2014-002 Patches Secure Transport\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple Security Update 2014-002 Patches Secure Transport\",\"datePublished\":\"2014-04-23T19:58:23+00:00\",\"dateModified\":\"2016-10-06T19:40:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#webpage\"},\"wordCount\":1024,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"keywords\":[\"Apple\",\"Bug Fixes\",\"Secure Transport\",\"Security Update 2014-002\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Yesterday, Apple released Security Update 2014-002\u00a0for OS X with patches for 13 vulnerabilities. This update is available for: OS X Lion v10.7.5, OS X","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/","og_locale":"en_US","og_type":"article","og_title":"Apple Security Update 2014-002 Patches Secure Transport - The Mac Security Blog","og_description":"Yesterday, Apple released Security Update 2014-002\u00a0for OS X with patches for 13 vulnerabilities. This update is available for: OS X Lion v10.7.5, OS X","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-04-23T19:58:23+00:00","article_modified_time":"2016-10-06T19:40:44+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/","name":"Apple Security Update 2014-002 Patches Secure Transport - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#primaryimage"},"datePublished":"2014-04-23T19:58:23+00:00","dateModified":"2016-10-06T19:40:44+00:00","description":"Yesterday, Apple released Security Update 2014-002\u00a0for OS X with patches for 13 vulnerabilities. This update is available for: OS X Lion v10.7.5, OS X","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Security Update 2014-002 Patches Secure Transport"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple Security Update 2014-002 Patches Secure Transport","datePublished":"2014-04-23T19:58:23+00:00","dateModified":"2016-10-06T19:40:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#webpage"},"wordCount":1024,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","keywords":["Apple","Bug Fixes","Secure Transport","Security Update 2014-002"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-6tA","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/24898"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=24898"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/24898\/revisions"}],"predecessor-version":[{"id":24970,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/24898\/revisions\/24970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8813"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=24898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=24898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=24898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}