May 18, 2015

About Remote Desktop Admin 3.8.4 Update Detail

About Remote Desktop Admin 3.8

Apple Remote Desktop 3.8 includes updates for the Remote Desktop app and the clients it remotely administers.

Included in this update

Apple Remote Desktop 3.8 update is recommended for Apple Remote Desktop 3 users. It addresses issues related to reliability, usability and compatibility. This update also provides the following specific improvements:
  • Improved support for OS X Yosemite
  • The ability to update versions of Apple Remote Desktop 3 installed from disc by using the Mac App Store

How to update

If you purchased Apple Remote Desktop from the Mac App Store, this update appears in the Updates pane of the App Store.
If you installed Apple Remote Desktop from a physical disc, update your Mac to OS X v10.10.2, then check the Updates pane of the App Store window. After updating OS X Yosemite, the Mac App Store allows you to upgrade to newer versions of some Apple apps including Apple Remote Desktop.
After updating, Remote Desktop appears in your list of Mac App Store purchases. You can install it on other computers you own by logging into the Mac App Store using your Apple ID. You no longer need to enter a software serial number to install your copy of Remote Desktop.

System requirements

Remote Desktop 3.8 requires the following:
  • OS X v10.9 or later
  • An Ethernet (recommended), Wi-Fi, or IP over Firewire, or Thunderbolt network connection
Last Modified:

May 8, 2015

About the security update Safari 8.0.6 detail

About the security content of Safari 8.0.6, Safari 7.1.6, and Safari 6.2.6

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see Apple Security Updates.
  • WebKit
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.3
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
    Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.
    CVE-ID
    CVE-2015-1152 : Apple
    CVE-2015-1153 : Apple
    CVE-2015-1154 : Apple
  • WebKit History
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.3
    Impact: Visiting a maliciously crafted website may compromise user information on the filesystem
    Description: A state management issue existed in Safari that allowed unprivileged origins to access contents on the filesystem. This issue was addressed through improved state management.
    CVE-ID
    CVE-2015-1155 : Joe Vennix of Rapid7 Inc. working with HP's Zero Day Initiative
  • WebKit Page Loading
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.3
    Impact: Visiting a malicious website by clicking a link may lead to user interface spoofing
    Description: An issue existed in the handling of the rel attribute in anchor elements. Target objects could get unauthorized access to link objects. This issue was addressed through improved link type adherence.
    CVE-ID
    CVE-2015-1156 : Zachary Durber of Moodle