Back

WIBU-SYSTEMS AG
Patches for WibuKey x64
Windows
2 patches available
WibuKey allows you to use one and the same type of hardware for the protection of your single station licenses as well as your floating licenses within one
WibuKey x64 Version 6.70.6536.500
Release Date
9/6/2024
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes

WibuKey 6.70$$$Release Date$$$2024-Sep-06$$$Operating Systems$$$Windows; macOS; Linux$$$Information$$$WibuKey for Windows: Fix of reported vulnerabilities according to CVE standard (Common$$$Vulnerabilities and Exposures)$$$• An improper buffer bounds check in WibuKey32.sys and WibuKey64.sys allows$$$specially crafted calls to cause arbitrary address writes; resulting in kernel memory$$$corruption (CVE-2024-45181) (WkRt-94453).$$$• An improper buffer bounds check in WibuKey32.sys and WibuKey64.sys allows$$$specially crafted calls to cause an arbitrary address read; which could result in$$$denial of service (CVE-2024-45182) (WkRt-94453).$$$Feature:$$$WkRt-80732: WibuKey Runtime: The Apple M1 chip is now fully supported natively. This$$$means that the Rosetta 2 emulation package is no longer required on systems with an$$$Apple M1 chip.$$$WkRt-71586: WibuKey Runtime: The OpenSource document for WibuKey is now$$$integrated into the user help and therefore directly available on all installations.$$$Bugfixes:$$$WkRt-100003: WibuKey Runtime: Setup: The setup under Windows contained an old *.cat$$$file; which in rare individual cases impeded the installation.$$$WkRt-96433: WibuKey Runtime: Setup: The WibuKey.dll could not be registered correctly$$$on 32-bit operating systems.$$$WkRt-79699: Server + WebMonitor: macOS: Starting and stopping the WibuKey server$$$using the provided StartServer and StopServer commands did not work reliably.$$$WkRt-88321: Misc: The installed language files were not signed.
WibuKey x64 Version 6.60.4820.500
Release Date
10/1/2021
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes

WibuKey 6.60$$$Release Date$$$2021-Oct-01$$$Operating Systems$$$Windows; macOS; Linux$$$Information$$$? Windows 11 is supported.$$$Fix of reported vulnerabilities according to CVE standard (Common Vulnerabilities and$$$Exposures)$$$? Update of jQuery library to fix various vulnerabilities (CVE-2020-11023; CVE-2020-$$$11022; CVE-2019-11358; CVE-2015-9251) of Medium category. The library is used$$$in WibuKey user help (FB78826).$$$? Removal of the user interface for WibuKey Server to avoid recurring vulnerabilities$$$in a used library (QT) now and in the future. The specific reason is the vulnerability$$$CVE-2017-12652; which is classified as Critical 9.8; but in the use case in WibuKey$$$was classified by Wibu-Systems CERT as Medium 6.5 (FB65083).$$$Features:$$$FB73816: WibuKey Runtime: Windows: The WibuKey Server service can now be started$$$by users independently of the User Account Control (UAC).$$$Bugfixes:$$$FB71481: WibuKey: Installer: macOS: The installer encountered problems related to the$$$Dark Mode setting.$$$FB62288: WkSvMon: Windows: On servers with several network interfaces the server list$$$could contain the same entry multiple times.$$$FB35225: WibuKey Runtime: Problems occurred during internal error handling.$$$FB48745: WibuKey Runtime: WibuKey Control Panel: The WibuKey Control Panel$$$eventually crashed when creating a report in some environments.$$$FB47467: WibuKey Runtime: WibuKey Control Panel: When resetting the Plug&Play$$$settings; an empty dialog appeared.$$$FB73206: WibuKey Runtime: When calling WkbAccess2() with flag WKB_ACC_WKNET$$$set; WkWin64.dll crashed.
Interested in automating patching for Adobe Acrobat?