Menu
Recently, Apple released the latest version of iOS 11.2 to bring some anticipated features along with various bug fixes. Now, Apple starts rolling out macOS High Sierra 10.13.2 stable update for all compatible Mac systems. If you want to update multiple macOS systems, you can download macOS High Sierra 10.13.2 Offline Installer using the links given in this post.
The latest macOS High Sierra 10.13.2 update introduces a short list of improvements and fixes for Mac devices including the patch for a widely reported critical bug that allows attackers to get full admin access without a password. Apple recommends all the Mac users to update macOS High Sierra in order to improve security, stability, and functionality of the systems.
Following Mac can Support macOS High Sierra. Now, you need to see if your Mac can support macOS High Sierra or not. The below list will show you which Mac can support macOS High Sierra. So, if you are having any of the following Mac then you are ok with a clean installation of Mac. MacBook: Late 2008 or fresher; Book Air: Late 2008 or fresher.
You may like:Download iOS 11.2 IPSW Final for iPhone, iPad and iPod Touch [Official Links]
If you are using macOS High Sierra 10.13.1, you can download macOS High Sierra 10.13.2 DMG file using official links and apply this maintenance update. On the other hand, you can also get this macOS update via Mac App Store.
In addition, Security Update 2017-002 macOS Sierra and Security Update 2017-005 El Capitan are also released and available to download for compatible systems.
Changelog of macOS High Sierra 10.13.2 update
Security Content of macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan
apache
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: Processing a maliciously crafted Apache configuration directive may result in the disclosure of process memory Description: Multiple issues were addressed by updating to version 2.4.28. CVE-2017-9798
curl
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: Malicious FTP servers may be able to cause the client to read out-of-bounds memory Description: An out-of-bounds read issue existed in the FTP PWD response parsing. This issue was addressed with improved bounds checking. CVE-2017-1000254: Max Dymond
Directory Utility
Available for: macOS High Sierra 10.13 and macOS High Sierra 10.13.1
Not impacted: macOS Sierra 10.12.6 and earlier Impact: An attacker may be able to bypass administrator authentication without supplying the administrator’s password Description: A logic error existed in the validation of credentials. This was addressed with improved credential validation. CVE-2017-13872
Intel Graphics Driver
Available for: macOS High Sierra 10.13.1
Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13883: an anonymous researcher ![]()
Intel Graphics Driver
Available for: macOS High Sierra 10.13.1
Impact: A local user may be able to cause unexpected system termination or read kernel memory Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-2017-13878: Ian Beer of Google Project Zero
Intel Graphics Driver
Available for: macOS High Sierra 10.13.1
Impact: An application may be able to execute arbitrary code with system privileges Description: An out-of-bounds read was addressed through improved bounds checking. CVE-2017-13875: Ian Beer of Google Project Zero
IOAcceleratorFamily
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13844: found by IMF developed by HyungSeok Han (daramg.gift) of SoftSec, KAIST (softsec.kaist.ac.kr)
IOKit
Available for: macOS High Sierra 10.13.1
Impact: An application may be able to execute arbitrary code with system privileges Description: An input validation issue existed in the kernel. This issue was addressed through improved input validation. CVE-2017-13848: Alex Plaskett of MWR InfoSecurity CVE-2017-13858: an anonymous researcher
IOKit
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues were addressed through improved state management. CVE-2017-13847: Ian Beer of Google Project Zero
Kernel
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13862: Apple
Kernel
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2017-13833: Brandon Azad
Kernel
Available for: macOS High Sierra 10.13.1
Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13876: Ian Beer of Google Project Zero
Kernel
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to read restricted memory Description: A type confusion issue was addressed with improved memory handling. CVE-2017-13855: Jann Horn of Google Project Zero
Kernel
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13867: Ian Beer of Google Project Zero
Kernel
Available for: macOS High Sierra 10.13.1
Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13865: Ian Beer of Google Project Zero
Kernel
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13868: Brandon Azad CVE-2017-13869: Jann Horn of Google Project Zero
Mail
Available for: macOS High Sierra 10.13.1
Impact: A S/MIME encrypted email may be inadvertently sent unencrypted if the receiver’s S/MIME certificate is not installed Description: An inconsistent user interface issue was addressed with improved state management. CVE-2017-13871: an anonymous researcher
Mail Drafts
Available for: macOS High Sierra 10.13.1
Impact: An attacker with a privileged network position may be able to intercept mail Description: An encryption issue existed with S/MIME credetials. The issue was addressed with additional checks and user control. CVE-2017-13860: Michael Weishaar of INNEO Solutions GmbH
OpenSSL
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to read restricted memory Description: An out-of-bounds read issue existed in X.509 IPAddressFamily parsing. This issue was addressed with improved bounds checking. CVE-2017-3735: found by OSS-Fuzz
Screen Sharing Server
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6
Impact: A user with screen sharing access may be able to access any file readable by root Description: A permissions issue existed in the handling of screen sharing sessions. This issue was addressed with improved permissions handling.
CVE-2017-13826: Trevor Jacques of Toronto
Download macOS High Sierra 10.13.2 Offline InstallerDownload Mac Os 10.13 High Sierra
High Sierra is an update of MacOS which focuses mostly on back-end developments and a higher level of user security. As such, this operating system lays a foundation for future upgrades.
Stay safeIn essence, High Sierra took what was good with Sierra and developed it into a more comprehensive software.
High Sierra emphasizes the already-existing benefits of MacOS previous system, Sierra. There are few bells and whistles, but the changes are noticeable and positive. The Apple file system is the most significant feature it brought. It enables the storage and encryption of a large number of files. Thus, it boosts performance and helps manage device memory issues.
Apple also introduced new formats for video and photos in this version. These formats compress data - that’s a benefit as files can get huge with ever-rising resolutions. They added support for virtual reality headsets as well.
Besides that, when it comes to Safari, Mac search engine, there are some notable improvements with the update. The users can now control annoying auto-play videos, prevent tracking, and more. There are also notification controls, and you will experience a boost in performance, too.
The most noticeable changes took place in Apple’s Photo App, though. It went through a total revamp both visually in its interface and terms of tools and functions available. Many other discreet changes happened all over the system.
Where can you run this program?
If you’re running Sierra on your Mac, you will be able to run this one as well.
Download Mac Os High Sierra From AppleIs there a better alternative?
Yes. Mojave, the newest version of MacOS, brought even more improved features to the table. However, if you can’t run it on your device, this is the second best.
Our take
High Sierra is not the shiniest upgrade Apple brought, but it’s one that sets the stage for new upgrades to come. Even out of that context, it’s a great operating system.
Should you download it?
Yes, if your device can support it. The new options and better security settings are worth getting.
10.13
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2020
Categories |