{"id":4628,"date":"2023-04-10T11:47:00","date_gmt":"2023-04-10T10:47:00","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=4628"},"modified":"2023-04-11T21:37:34","modified_gmt":"2023-04-11T20:37:34","slug":"apple-hitno-azurira-ios-ipados-i-macos","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2023\/04\/10\/apple-hitno-azurira-ios-ipados-i-macos\/","title":{"rendered":"Apple hitno a\u017eurira iOS, iPadOS i macOS"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Kompanija <em>Apple<\/em> hitno a\u017eurira <em>iOS<\/em>, <em>iPadOS<\/em> i <em>macOS<\/em> operativne sisteme zbog otkrivenih ranjivosti koje se aktivno iskori\u0161tavaju.<\/span><\/p>\n<div id=\"attachment_4631\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4631\" class=\"size-full wp-image-4631\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/04\/iOS-iPadOS-i-macOS.jpg\" alt=\"iOS, iPadOS i macOS\" width=\"1024\" height=\"576\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/04\/iOS-iPadOS-i-macOS.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/04\/iOS-iPadOS-i-macOS-300x169.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/04\/iOS-iPadOS-i-macOS-768x432.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/04\/iOS-iPadOS-i-macOS-18x10.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-4631\" class=\"wp-caption-text\"><em>Orginal image from <a href=\"https:\/\/wallpapercave.com\/w\/wp4972698\" target=\"_blank\" rel=\"noopener\">Wallpapercave<\/a>; Edit by Sa\u0161a \u0110uri\u0107<\/em><\/p><\/div>\n<h2><span style=\"font-size: 14pt;\"><strong><em>iOS<\/em>, <em>iPadOS<\/em> i <em>macOS<\/em> ranjivosti<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">Kompanija Apple je objavila hitno a\u017euriranje za operativne sisteme <em>iOS 16.4.1<\/em>, <em>iPadOS 16.4.1<\/em> i <em>macOS Ventura 13.3.1<\/em>, kao i za Internet pregleda\u010d <em>Safari 16.4.1<\/em>. Do sada <a href=\"https:\/\/sajberinfo.com\/en\/2023\/04\/11\/zero-day\/\" target=\"_blank\" rel=\"nofollow noopener\">nepoznate ranjivosti (eng. <em>zero-day<\/em>)<\/a> napada\u010dima mogu omogu\u0107i da preuzmu kontrolu nad ure\u0111ajima koji nisu a\u017eurirani.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><a href=\"https:\/\/support.apple.com\/en-us\/HT213720\" target=\"_blank\" rel=\"noopener\">A\u017euriranje za <em>iOS 16.4.1<\/em> i <em>iPadOS 16.4.<\/em>1<\/a> se odnosi na ranjivosti <em>CVE-2023-28205<\/em> i <em>CVE-2023-28206 <\/em>koje se aktivno iskori\u0161tavaju u kiberneti\u010dkom prostoru. Ranjivost <a href=\"https:\/\/feedly.com\/cve\/CVE-2023-28206\" target=\"_blank\" rel=\"noopener\"><em>CVE-2023-28206<\/em><\/a> poga\u0111a <em>IOSurfaceAccelerator<\/em> i mo\u017ee omogu\u0107iti napada\u010du da pokrene zlonamjernu aplikaciju kako bi dobio najvi\u0161e korisni\u010dke privilegije. Druga ranjivosti, <a href=\"https:\/\/vulners.com\/cve\/CVE-2023-28205\" target=\"_blank\" rel=\"noopener\"><em>CVE-2023-28205<\/em><\/a> se odnosi na <em>WebKit<\/em> i mo\u017ee omogu\u0107iti izvr\u0161avanje posebno pripremljenog sadr\u017eaja na Internet stranici koji dalje mo\u017ee omogu\u0107iti pokretanje proizvoljnog k\u00f4da od stane napada\u010da.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Svako od ovih a\u017euriranje je dostupno i za<em> iPhone 8<\/em> i noviji, <em>iPad Pro<\/em> (svi modeli,<em> iPad Air<\/em> tre\u0107e generacije i noviji, <em>iPad<\/em> pete generacije i noviji i <em>iPad<\/em> mini pete generacije i noviji. Kompanija Apple se obratila ovom problemu i sigurnosnim a\u017euriranjem za <a href=\"https:\/\/support.apple.com\/en-us\/HT213721\" target=\"_blank\" rel=\"noopener\"><em>macOS Ventura 13.3.1<\/em><\/a>.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Posljednje a\u017euriranje se odnosi na ranjivost <em>WebKit<\/em> (<em>CVE-2023-28205<\/em>) koja poga\u0111a <a href=\"https:\/\/support.apple.com\/en-us\/HT213722\" target=\"_blank\" rel=\"noopener\">Internet pregleda\u010d <em>Safari 16.4.<\/em>1<\/a>, a dostupno je za operativne sisteme <em>macOS Big<\/em> <em>Sur<\/em> i <em>macOS Monterey<\/em>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-size: 14pt;\"><strong>Zaklju\u010dak<\/strong><\/span><\/h3>\n<p><span style=\"font-size: 14pt;\">Nije ba\u0161 uobi\u010dajeno da se a\u017euriranje za operativne sisteme pojavi tokom prazni\u010dnog vikenda, ali sa obzirom na opasnost koju ranjivost predstavljaju za korisnike, to je razumljivo.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Pored toga, <em>macOS Ventura 13.3<\/em> koji je stigao ne\u0161to ranije, ispravio je neke sigurnosne probleme, ali na\u017ealost napravio nove. Jedan o problema je onemogu\u0107avanje korisnika da kori\u0161tenjem <em>Apple Watch<\/em>-a otklju\u010daju svoje povezane <em>Mac<\/em> ure\u0111aje automatski. A\u017euriranje za <em>macOS 13.3.1<\/em> bi trebalo da rije\u0161i i taj problem.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Tu je i <em>iOS 16.4.1 <\/em>a\u017euriranje koje ispravlja i pojedine probleme kod <em>iPhone<\/em> korisnika, uklju\u010duju\u0107i problem sa virtuelnim asistentom <em>Siri<\/em>.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Korisnici koji nisu ve\u0107 preuzeli a\u017euriranja, trebalo bi da odu na <em>Settings &gt; General &gt; Software Update<\/em> i provjere da li imaju dostupna a\u017euriranja na svom <em>iPhone<\/em>, <em>iPad<\/em> ili <em>Mac<\/em> ure\u0111aju. Korisnici operativnih sistema<em> macOS Big Sur <\/em>i <em>Monterey<\/em> mogu uraditi to isto da bi dobili najnoviju verziju Internet pregleda\u010da <em>Safari<\/em>.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Kompanija Apple hitno a\u017eurira iOS, iPadOS i macOS operativne sisteme zbog otkrivenih ranjivosti koje se aktivno iskori\u0161tavaju. iOS, iPadOS i macOS ranjivosti Kompanija Apple je objavila hitno a\u017euriranje za operativne sisteme iOS 16.4.1, iPadOS&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":4631,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[323,186,336,144,54,64,126],"class_list":["post-4628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-apple","tag-ios","tag-ipados","tag-macos","tag-sajber-bezbjednost","tag-sajber-prijetnja","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=4628"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4628\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/4631"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=4628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=4628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=4628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}