{"id":51955,"date":"2016-03-23T14:31:05","date_gmt":"2016-03-23T21:31:05","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=51955"},"modified":"2016-03-23T14:31:05","modified_gmt":"2016-03-23T21:31:05","slug":"apple-updates-os-x-el-capitan-issues-security-update-2016-002","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/","title":{"rendered":"Apple Updates OS X El Capitan, Issues Security Update 2016-002"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-11697\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-blog-header.jpg\" alt=\"Software Update\" width=\"600\" height=\"336\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-blog-header-150x84.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-blog-header-300x168.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>This week, Apple released security updates for nearly all of its software, and if you haven&#8217;t already done so, you should install them to steer clear of the bad guys who might attempt to exploit the now known vulnerabilities.<\/p>\n<p>We encourage all Apple users to download and install all relevant software\u00a0updates \u2014 patching holes in your software&#8217;s armor is your first line of defense to protect yourself against known vulnerabilities. It only takes a few moments to update your software, and if doing so can help ensure hackers don&#8217;t ruin your day, updating is\u00a0time well spent.<\/p>\n<p>iPhone and iPad users should get <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-9-3-patches-imessages-encryption-vulnerability\/\" target=\"_blank\">iOS 9.3\u00a0to fix\u00a0the iMessage encryption flaw<\/a>.\u00a0Mac users should grab\u00a0<strong>OS X El Capitan 10.11.4<\/strong>, or <strong>Security Update 2016-002<\/strong>, which patches the vulnerabilities described below. If you browse the web using Safari, you should fetch the latest patches in\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-9-1-closes-security-hole-that-may-leak-sensitive-data\/\" target=\"_blank\">Safari 9.1<\/a> to close a security hole that could leak potentially sensitive information. Furthermore, Apple Watch users should update to <a href=\"https:\/\/support.apple.com\/kb\/HT206168\" target=\"_blank\">watchOS 2.2<\/a>, while Apple TV users should install <a href=\"https:\/\/support.apple.com\/en-us\/HT206169\" target=\"_blank\">tvOS 9.2<\/a>.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51967\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/osx-mavericks-yosemite-elcapitan.png\" alt=\"OS X Mavericks Yosemite El Capitan logos\" width=\"500\" height=\"110\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/osx-mavericks-yosemite-elcapitan.png 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/osx-mavericks-yosemite-elcapitan-150x33.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/osx-mavericks-yosemite-elcapitan-300x66.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Security Update 2016-002\u00a0is available for OS X Mavericks 10.9.5, OS X Yosemite 10.10.5, and OS X El Capitan 10.11 to 10.11.3.<\/p>\n<p>Security Update 2016-002 includes fixes for the following security bugs:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8126\" target=\"_blank\">CVE-2015-8126<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8472\" target=\"_blank\">CVE-2015-8472<\/a> : Processing a maliciously crafted .png file may lead to arbitrary code execution. Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1733\" target=\"_blank\">CVE-2016-1733<\/a> : An application may be able to execute arbitrary code with kernel privileges. A memory corruption issue was addressed through improved input validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1732\" target=\"_blank\">CVE-2016-1732<\/a> : A local user may be able to determine kernel memory layout. An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1734\" target=\"_blank\">CVE-2016-1734<\/a> : An application may be able to execute arbitrary code with kernel privileges. A memory corruption issue existed in the parsing of data from USB devices. This issue was addressed through improved input validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1735\" target=\"_blank\">CVE-2016-1735<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1736\" target=\"_blank\">CVE-2016-1736<\/a> : An application may be able to execute arbitrary code with kernel privileges. Multiple memory corruption issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1737\" target=\"_blank\">CVE-2016-1737<\/a> : Processing a maliciously crafted .dfont file may lead to arbitrary code execution. Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1738\" target=\"_blank\">CVE-2016-1738<\/a> : An attacker may tamper with code-signed applications to execute arbitrary code in the application&#8217;s context. A code signing verification issue existed in dyld. This issue was addressed with improved validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1740\" target=\"_blank\">CVE-2016-1740<\/a> : Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution. A memory corruption issue was addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8659\" target=\"_blank\">CVE-2015-8659<\/a> : A remote attacker may be able to execute arbitrary code. Multiple vulnerabilities existed in nghttp2 versions prior to 1.6.0, the most serious of which may have led to remote code execution. These were addressed by updating nghttp2 to version 1.6.0.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1743\" target=\"_blank\">CVE-2016-1743<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1744\" target=\"_blank\">CVE-2016-1744<\/a> : An application may be able to execute arbitrary code with kernel privileges. Multiple memory corruption issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1745\" target=\"_blank\">CVE-2016-1745<\/a> : A local user may be able to cause a denial of service. A null pointer dereference was addressed through improved validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1746\" target=\"_blank\">CVE-2016-1746<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1747\" target=\"_blank\">CVE-2016-1747<\/a> : An application may be able to execute arbitrary code with kernel privileges. A memory corruption issue was addressed through improved input validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1748\" target=\"_blank\">CVE-2016-1748<\/a> : An application may be able to determine kernel memory layout. A memory corruption issue was addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1749\" target=\"_blank\">CVE-2016-1749<\/a> : An application may be able to execute arbitrary code with kernel privileges. Multiple memory corruption issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1750\" target=\"_blank\">CVE-2016-1750<\/a> : An application may be able to execute arbitrary code with kernel privileges. A use after free issue was addressed through improved memory management.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1757\" target=\"_blank\">CVE-2016-1757<\/a> : An application may be able to execute arbitrary code with kernel privileges. A race condition existed during the creation of new processes. This was addressed through improved state handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1756\" target=\"_blank\">CVE-2016-1756<\/a> : An application may be able to execute arbitrary code with kernel privileges. A null pointer dereference was addressed through improved input validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1754\" target=\"_blank\">CVE-2016-1754<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1755\" target=\"_blank\">CVE-2016-1755<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1759\" target=\"_blank\">CVE-2016-1759<\/a> : An application may be able to execute arbitrary code with kernel privileges. Multiple memory corruption issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1758\" target=\"_blank\">CVE-2016-1758<\/a> : An application may be able to determine kernel memory layout. An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1753\" target=\"_blank\">CVE-2016-1753<\/a> : An application may be able to execute arbitrary code with kernel privileges. Multiple integer overflows were addressed through improved input validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1752\" target=\"_blank\">CVE-2016-1752<\/a> : An application may be able to cause a denial of service. A denial of service issue was addressed through improved validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-1819\" target=\"_blank\">CVE-2015-1819<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5312\" target=\"_blank\">CVE-2015-5312<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7499\" target=\"_blank\">CVE-2015-7499<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7500\" target=\"_blank\">CVE-2015-7500<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7942\" target=\"_blank\">CVE-2015-7942<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8035\" target=\"_blank\">CVE-2015-8035<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8242\" target=\"_blank\">CVE-2015-8242<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1761\" target=\"_blank\">CVE-2016-1761<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1762\" target=\"_blank\">CVE-2016-1762<\/a> : Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution. Multiple memory corruption issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1788\" target=\"_blank\">CVE-2016-1788<\/a> : An attacker who is able to bypass Apple&#8217;s certificate pinning, intercept TLS connections, inject messages, and record encrypted attachment-type messages may be able to read attachments. A cryptographic issue was addressed by rejecting duplicate messages on the client.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1764\" target=\"_blank\">CVE-2016-1764<\/a> : Clicking a JavaScript link can reveal sensitive user information. An issue existed in the processing of JavaScript links. This issue was addressed through improved content security policy checks.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1741\" target=\"_blank\">CVE-2016-1741<\/a> : An application may be able to execute arbitrary code with kernel privileges. Multiple memory corruption issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0777\" target=\"_blank\">CVE-2016-0777<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0778\" target=\"_blank\">CVE-2016-0778<\/a> : Connecting to a server may leak sensitive user information, such as a client&#8217;s private keys. Roaming, which was on by default in the OpenSSH client, exposed an information leak and a buffer overflow. These issues were addressed by disabling roaming in the client.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5333\" target=\"_blank\">CVE-2015-5333<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5334\" target=\"_blank\">CVE-2015-5334<\/a> : Multiple vulnerabilities in LibreSSL. Multiple vulnerabilities existed in LibreSSL versions prior to 2.1.8. These were addressed by updating LibreSSL to version 2.1.8.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-3195\" target=\"_blank\">CVE-2015-3195<\/a> : A remote attacker may be able to cause a denial of service. A memory leak existed in OpenSSL versions prior to 0.9.8zh. This issue was addressed by updating OpenSSL to version 0.9.8zh.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-9495\" target=\"_blank\">CVE-2014-9495<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0973\" target=\"_blank\">CVE-2015-0973<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8126\" target=\"_blank\">CVE-2015-8126<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8472\" target=\"_blank\">CVE-2015-8472<\/a> : Processing a maliciously crafted .png file may lead to arbitrary code execution. Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1767\" target=\"_blank\">CVE-2016-1767<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1768\" target=\"_blank\">CVE-2016-1768<\/a> : Processing a maliciously crafted FlashPix Bitmap Image may lead to unexpected application termination or arbitrary code execution. Multiple memory corruption issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1769\" target=\"_blank\">CVE-2016-1769<\/a> : Processing a maliciously crafted Photoshop document may lead to unexpected application termination or arbitrary code execution. Multiple memory corruption issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1770\" target=\"_blank\">CVE-2016-1770<\/a> : Clicking a tel link can make a call without prompting the user. A user was not prompted before invoking a call. This was addressed through improved entitlement checks.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7551\" target=\"_blank\">CVE-2015-7551<\/a> : A local attacker may be able to cause unexpected application termination or arbitrary code execution. An unsafe tainted string usage vulnerability existed in versions prior to 2.0.0-p648. This issue was addressed by updating to version 2.0.0-p648.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1773\" target=\"_blank\">CVE-2016-1773<\/a> : A local user may be able to check for the existence of arbitrary files. A permissions issue existed in code signing tools. This was addressed though additional ownership checks.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1950\" target=\"_blank\">CVE-2016-1950<\/a> : Processing a maliciously crafted certificate may lead to arbitrary code execution. A memory corruption issue existed in the ASN.1 decoder. This issue was addressed through improved input validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8126\" target=\"_blank\">CVE-2015-8126<\/a> : Processing a maliciously crafted .png file may lead to arbitrary code execution. Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by removing libpng.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1775\" target=\"_blank\">CVE-2016-1775<\/a> : Processing a maliciously crafted font file may lead to arbitrary code execution. A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0801\" target=\"_blank\">CVE-2016-0801<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0802\" target=\"_blank\">CVE-2016-0802<\/a> : An attacker with a privileged network position may be able to execute arbitrary code. A frame validation and memory corruption issue existed for a given ethertype. This issue was addressed through additional ethertype validation and improved memory handling.<\/li>\n<\/ul>\n<p>Before updating your operating system, it&#8217;s always a good plan to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-personal-backup-compared-with-apples-time-machine\/\" target=\"_blank\">back up your Mac&#8217;s files<\/a> in case of malfunction or other disaster. El Capitan users\u00a0can head over to the <a href=\"http:\/\/appstore.com\/mac\/osxelcapitan\" target=\"_blank\">El Capitan page on the Mac App Store<\/a> to get\u00a0OS X El Capitan 10.11.4, which includes the security content of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-9-1-closes-security-hole-that-may-leak-sensitive-data\/\" target=\"_blank\">Safari 9.1<\/a>.<\/p>\n<p><strong>Downloads <\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/support.apple.com\/kb\/DL1868?viewlocale=en_US&amp;locale=en_US\" target=\"_blank\">OS X El Capitan 10.11.4 Update<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/DL1869?viewlocale=en_US&amp;locale=en_US\" target=\"_blank\">OS X El Capitan 10.11.4 (Combo Update)<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/DL1871?viewlocale=en_US&amp;locale=en_US\" target=\"_blank\">Security Update 2016-002 (Yosemite)<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/DL1872?viewlocale=en_US&amp;locale=en_US\" target=\"_blank\">Security Update 2016-002 (Mavericks)<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Apple releases OS X El Capitan 10.11.4 and Security Update 2016-002. Get the latest software updates for your Apple computer to protect yourself against known vulnerabilities. <\/p>\n","protected":false},"author":4,"featured_media":11701,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,174,168,2872,2875],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple releases OS X El Capitan 10.11.4 and Security Update 2016-002. Get the latest software updates for your Apple computer to protect yourself against known vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Updates OS X El Capitan, Issues Security Update 2016-002 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple releases OS X El Capitan 10.11.4 and Security Update 2016-002. Get the latest software updates for your Apple computer to protect yourself against known vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-23T21:31:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Software Update\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/\",\"name\":\"Apple Updates OS X El Capitan, Issues Security Update 2016-002 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#primaryimage\"},\"datePublished\":\"2016-03-23T21:31:05+00:00\",\"dateModified\":\"2016-03-23T21:31:05+00:00\",\"description\":\"Apple releases OS X El Capitan 10.11.4 and Security Update 2016-002. Get the latest software updates for your Apple computer to protect yourself against known vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Updates OS X El Capitan, Issues Security Update 2016-002\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple Updates OS X El Capitan, Issues Security Update 2016-002\",\"datePublished\":\"2016-03-23T21:31:05+00:00\",\"dateModified\":\"2016-03-23T21:31:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#webpage\"},\"wordCount\":1438,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg\",\"keywords\":[\"Apple\",\"Mac\",\"OS X\",\"OS X El Capitan 10.11.4\",\"Security Update 2016-002\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple releases OS X El Capitan 10.11.4 and Security Update 2016-002. Get the latest software updates for your Apple computer to protect yourself against known vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/","og_locale":"en_US","og_type":"article","og_title":"Apple Updates OS X El Capitan, Issues Security Update 2016-002 - The Mac Security Blog","og_description":"Apple releases OS X El Capitan 10.11.4 and Security Update 2016-002. Get the latest software updates for your Apple computer to protect yourself against known vulnerabilities.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-03-23T21:31:05+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","width":"400","height":"260","caption":"Software Update"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/","name":"Apple Updates OS X El Capitan, Issues Security Update 2016-002 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#primaryimage"},"datePublished":"2016-03-23T21:31:05+00:00","dateModified":"2016-03-23T21:31:05+00:00","description":"Apple releases OS X El Capitan 10.11.4 and Security Update 2016-002. Get the latest software updates for your Apple computer to protect yourself against known vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Updates OS X El Capitan, Issues Security Update 2016-002"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple Updates OS X El Capitan, Issues Security Update 2016-002","datePublished":"2016-03-23T21:31:05+00:00","dateModified":"2016-03-23T21:31:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#webpage"},"wordCount":1438,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","keywords":["Apple","Mac","OS X","OS X El Capitan 10.11.4","Security Update 2016-002"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-updates-os-x-el-capitan-issues-security-update-2016-002\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-dvZ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51955"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=51955"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51955\/revisions"}],"predecessor-version":[{"id":51982,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51955\/revisions\/51982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/11701"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=51955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=51955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=51955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}