{"id":29515,"date":"2014-07-01T12:07:16","date_gmt":"2014-07-01T19:07:16","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=29515"},"modified":"2016-10-06T13:55:27","modified_gmt":"2016-10-06T20:55:27","slug":"apple-releases-os-x-mavericks-10-9-4-security-update-2014-003","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/","title":{"rendered":"Apple Releases OS X Mavericks 10.9.4, Security Update 2014-003"},"content":{"rendered":"<p>OS X Mavericks 10.9.4 and Security Update 2014-003 are now available and include a long list of security bug fixes. Apple rolled out these updates in conjunction with <a title=\"Apple Fixes Security Bugs in Apple TV 6.1.2 Update\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-security-bugs-in-apple-tv-6-1-2-update\/\" target=\"_blank\">Apple TV 6.1.2<\/a>, <a title=\"Safari 6.1.5 and Safari 7.0.5 Updates Address Security Bugs\" href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-6-1-5-and-safari-7-0-5-updates-address-security-bugs\/\" target=\"_blank\">Safari versions 6.1.5 and 7.0.5<\/a>, and\u00a0<a title=\"iOS 7.1.2 Software Update Contains Security Bug Fixes\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/\" target=\"_blank\">iOS 7.1.2<\/a>.<\/p>\n<p>This update is available for: OS X Lion 10.7.5, OS X Lion Server 10.7.5, OS X Mountain Lion 10.8.5, and\u00a0OS X Mavericks 10.9 to 10.9.3.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/security-update-2014-003-1-0\/\" rel=\"attachment wp-att-29662\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-29662\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/07\/Security-Update-2014-003-1.0.png\" alt=\"Security Update 2014-003\" width=\"400\" height=\"115\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/07\/Security-Update-2014-003-1.0.png 400w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/07\/Security-Update-2014-003-1.0-150x43.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/07\/Security-Update-2014-003-1.0-300x86.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>Altogether, Security Update 2014-003 addresses 19 vulnerabilities (CVEs) and includes an update to the certificate trust policy, according to Apple&#8217;s\u00a0<a title=\"About the security content of OS X Mavericks v10.9.4 and Security Update 2014-003\" href=\"http:\/\/support.apple.com\/kb\/HT6296\" target=\"_blank\">product security page<\/a>.<\/p>\n<p>Security Update 2014-003 addresses the following vulnerabilities:<\/p>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1370\" target=\"_blank\">CVE-2014-1370<\/a> :\u00a0Opening a maliciously crafted zip file may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0The byte-swapping implementation in copyfile in Apple OS X before 10.9.4 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds memory access and application crash) via a crafted AppleDouble file in a ZIP archive. This issue was\u00a0addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0015\" target=\"_blank\">CVE-2014-0015<\/a> :\u00a0A remote attacker may be able to gain access to another\u00a0user&#8217;s session.\u00a0cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1371\" target=\"_blank\">CVE-2014-1371<\/a> :\u00a0A sandboxed application may be able to circumvent sandbox\u00a0restrictions.\u00a0An unvalidated array index issue existed in the\u00a0Dock&#8217;s handling of messages from applications. A maliciously\u00a0crafted message could cause an invalid function pointer to be\u00a0dereferenced, which could lead to an unexpected application\u00a0termination or arbitrary code execution.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1372\" target=\"_blank\">CVE-2014-1372<\/a> :\u00a0Graphics Driver in Apple OS X before 10.9.4 does not properly restrict read operations during processing of an unspecified system call, which allows local users to obtain sensitive information from kernel memory and bypass the ASLR protection mechanism via a crafted call. This issue was addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1317\" target=\"_blank\">CVE-2014-1317<\/a> :\u00a0An attacker with access to a system may be able to recover\u00a0Apple ID credentials.\u00a0An issue existed in the handling of iBooks logs. iBooks Commerce in Apple OS X before 10.9.4 places Apple ID credentials in the iBooks log, which allows local users to obtain sensitive information by reading this file. This issue was addressed by\u00a0disallowing logging of credentials.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1373\" target=\"_blank\">CVE-2014-1373<\/a> : A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0A validation issue existed in the handling of an OpenGL\u00a0API call. This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1375\" target=\"_blank\">CVE-2014-1375<\/a> :\u00a0A local user can read a kernel pointer, which can be used to\u00a0bypass kernel address space layout randomization.\u00a0A kernel pointer stored in an IOKit object could be\u00a0retrieved from userland. This issue was addressed by removing the\u00a0pointer from the object.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1376\" target=\"_blank\">CVE-2014-1376<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0A validation issue existed in the handling of an OpenCL\u00a0API call. This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1377\" target=\"_blank\">CVE-2014-1377<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0An array indexing issue existed in IOAcceleratorFamily.\u00a0This issue was addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1378\" target=\"_blank\">CVE-2014-1378<\/a> :\u00a0A local user can read a kernel pointer, which can be used to\u00a0bypass kernel address space layout randomization.\u00a0A kernel pointer stored in an IOKit object could be\u00a0retrieved from userland. This issue was addressed by using a unique\u00a0ID instead of a pointer.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1355\" target=\"_blank\">CVE-2014-1355<\/a> :\u00a0A local user could cause an unexpected system restart.\u00a0The IOKit implementation in the kernel in Apple iOS before 7.1.2 and Apple TV before 6.1.2, and in IOReporting in Apple OS X before 10.9.4, allows local users to cause a denial of service (NULL pointer dereference and reboot) via crafted API arguments. This issue was addressed through additional\u00a0validation of IOKit API arguments.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1359\" target=\"_blank\">CVE-2014-1359<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0Integer underflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application. This issue was\u00a0addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1356\" target=\"_blank\">CVE-2014-1356<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0Heap-based buffer overflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application that sends IPC messages. This issue was addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1357\" target=\"_blank\">CVE-2014-1357<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0Heap-based buffer overflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application that generates log messages. This issue was addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1358\" target=\"_blank\">CVE-2014-1358<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0Integer overflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application. This issue was\u00a0addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1379\" target=\"_blank\">CVE-2014-1379<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0Multiple null dereference issues existed in kernel\u00a0graphics drivers. A maliciously crafted 32-bit executable may have\u00a0been able to obtain elevated privileges.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1380\" target=\"_blank\">CVE-2014-1380<\/a> :\u00a0The Security &#8211; Keychain component in Apple OS X before 10.9.4 does not properly implement keystroke observers, which allows physically proximate attackers to bypass the screen-lock protection mechanism, and enter characters into an arbitrary window under the lock window, via keyboard input. This issue was addressed through\u00a0improved keystroke observer management.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1361\" target=\"_blank\">CVE-2014-1361<\/a> :\u00a0Two bytes of memory could be disclosed to a remote attacker.\u00a0An uninitialized memory access issue existing in the\u00a0handling of DTLS messages in a TLS connection. This issue was\u00a0addressed by only accepting DTLS messages in a DTLS connection.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1381\" target=\"_blank\">CVE-2014-1381<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0Thunderbolt in Apple OS X before 10.9.4 does not properly restrict IOThunderBoltController API calls, which allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds memory access and application crash) via a crafted call. This issue was\u00a0addressed through improved bounds checking.<\/li>\n<\/ul>\n<p>We strongly encourage all Mac users to download and install all security updates as soon as possible \u2013 it is an essential layer of security that keeps your digital life secure.<\/p>\n<p>You can update through Apple\u2019s Software Update tool by choosing\u00a0<strong>Apple menu<\/strong>\u00a0&gt;<strong>Software Update<\/strong>\u00a0when you\u2019re ready to install, or you can\u00a0go directly to Apple\u2019s support page to download the updates from there.<\/p>\n<p>OS X Lion Server users can go here to <a title=\"Security Update 2014-003 Server (Lion)\" href=\"http:\/\/support.apple.com\/kb\/DL1752\" target=\"_blank\">download Security Update 2014-003<\/a> (184.3 MB).<\/p>\n<p>OS X Lion users can go here to <a title=\"Security Update 2014-003 (Lion)\" href=\"http:\/\/support.apple.com\/kb\/DL1751\" target=\"_blank\">download Security Update 2014-003<\/a> (134 MB).<\/p>\n<p>OS X Mountain Lion users can go here to <a title=\"Security Update 2014-003 (Mountain Lion)\" href=\"http:\/\/support.apple.com\/kb\/DL1753\" target=\"_blank\">download Security Update 2014-003<\/a> (139.3 MB).<\/p>\n<p>OS X Mavericks users can <a title=\"OS X Mavericks 10.9.4 Update\" href=\"http:\/\/support.apple.com\/kb\/DL1754\" target=\"_blank\">go here to download<\/a> the 283 MB update; this update also includes <a title=\"Safari 6.1.5 and Safari 7.0.5 Updates Address Security Bugs\" href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-6-1-5-and-safari-7-0-5-updates-address-security-bugs\/\" target=\"_blank\">Safari 7.0.5<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OS X Mavericks 10.9.4 and Security Update 2014-003 are now available and include a long list of security bug fixes. Apple rolled out these updates in conjunction with Apple TV 6.1.2, Safari versions 6.1.5 and 7.0.5, and\u00a0iOS 7.1.2. This update is available for: OS X Lion 10.7.5, OS X Lion Server 10.7.5, OS X Mountain [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":8813,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,261,1237,168,1234],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"OS X Mavericks 10.9.4 and Security Update 2014-003 are now available and include a long list of security bug fixes. Apple rolled out these updates in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Releases OS X Mavericks 10.9.4, Security Update 2014-003 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"OS X Mavericks 10.9.4 and Security Update 2014-003 are now available and include a long list of security bug fixes. Apple rolled out these updates in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-01T19:07:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T20:55:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/\",\"name\":\"Apple Releases OS X Mavericks 10.9.4, Security Update 2014-003 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#primaryimage\"},\"datePublished\":\"2014-07-01T19:07:16+00:00\",\"dateModified\":\"2016-10-06T20:55:27+00:00\",\"description\":\"OS X Mavericks 10.9.4 and Security Update 2014-003 are now available and include a long list of security bug fixes. Apple rolled out these updates in\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Releases OS X Mavericks 10.9.4, Security Update 2014-003\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple Releases OS X Mavericks 10.9.4, Security Update 2014-003\",\"datePublished\":\"2014-07-01T19:07:16+00:00\",\"dateModified\":\"2016-10-06T20:55:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#webpage\"},\"wordCount\":1140,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"keywords\":[\"Apple\",\"Bug Fixes\",\"Mavericks 10.9.4\",\"OS X\",\"Security Update 2014-003\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"OS X Mavericks 10.9.4 and Security Update 2014-003 are now available and include a long list of security bug fixes. Apple rolled out these updates in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/","og_locale":"en_US","og_type":"article","og_title":"Apple Releases OS X Mavericks 10.9.4, Security Update 2014-003 - The Mac Security Blog","og_description":"OS X Mavericks 10.9.4 and Security Update 2014-003 are now available and include a long list of security bug fixes. Apple rolled out these updates in","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-07-01T19:07:16+00:00","article_modified_time":"2016-10-06T20:55:27+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/","name":"Apple Releases OS X Mavericks 10.9.4, Security Update 2014-003 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#primaryimage"},"datePublished":"2014-07-01T19:07:16+00:00","dateModified":"2016-10-06T20:55:27+00:00","description":"OS X Mavericks 10.9.4 and Security Update 2014-003 are now available and include a long list of security bug fixes. Apple rolled out these updates in","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Releases OS X Mavericks 10.9.4, Security Update 2014-003"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple Releases OS X Mavericks 10.9.4, Security Update 2014-003","datePublished":"2014-07-01T19:07:16+00:00","dateModified":"2016-10-06T20:55:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#webpage"},"wordCount":1140,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","keywords":["Apple","Bug Fixes","Mavericks 10.9.4","OS X","Security Update 2014-003"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-releases-os-x-mavericks-10-9-4-security-update-2014-003\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-7G3","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29515"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=29515"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29515\/revisions"}],"predecessor-version":[{"id":58165,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29515\/revisions\/58165"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8813"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=29515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=29515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=29515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}