Office Patch For El Capitan

Check compatibility

You can upgrade to OS X El Capitan from OS X Snow Leopard or later on any of the following Mac models. Your Mac also needs at least 2GB of memory and 8.8GB of available storage space.

MacBook introduced in 2009 or later, plus MacBook (13-inch, Aluminum, Late 2008)
MacBook Air introduced in late 2008 or later
MacBook Pro introduced in mid 2007 or later
Mac mini introduced in early 2009 or later
iMac introduced in mid 2007 or later
Mac Pro introduced in early 2008 or later
Xserve models introduced in early 2009

To find your Mac model, memory, storage space, and macOS version, choose About This Mac from the Apple menu . If your Mac isn't compatible with OS X El Capitan, the installer will let you know.

Make a backup

Office Patch For El Capitan

Before installing any upgrade, it’s a good idea to back up your Mac. Time Machine makes it simple, and other backup methods are also available. Learn how to back up your Mac.

Get connected

It takes time to download and install OS X, so make sure that you have a reliable Internet connection. If you're using a Mac notebook computer, plug it into AC power.

Oct 05, 2015  Microsoft's first support replies came shortly after OS X El Capitan was released, which means the company has been working on a fix for several days now, but it is not clear when a patch. Upgrade Mac OS X El Capitan to macOS Sierra 10.12. To upgrade Mac OS X El Capitan to macOS Sierra 10.12, the latest updates from Apple.Inc, Download the macOS Sierra 10.12.1 latest version from Apple App Store. #1.Open Apple App Store then navigate to Featured tab. Find macOS Sierra from right sidebar on app store then click on.

Download OS X El Capitan

For the strongest security and latest features, find out whether you can upgrade to macOS Catalina, the latest version of macOS.

If you still need OS X El Capitan, use this link: Download OS X El Capitan. A file named InstallMacOSX.dmg will download to your Mac.

Install the macOS installer

Double-click the downloaded file to open a window showing its contents. Then double-click the file within, named InstallMacOSX.pkg.

Follow the onscreen instructions, which will guide you through the steps necessary to install.

Begin installation

After installation of the installer is complete, open the Applications folder on your Mac, then double-click the file named Install OS X El Capitan.

Click Continue and follow the onscreen instructions. You might find it easiest to begin installation in the evening so that it can complete overnight, if needed.

Allow installation to complete

Please allow installation to complete without putting your Mac to sleep or closing its lid. Your Mac might restart, show a progress bar, or show a blank screen several times as it installs both OS X and related updates to your Mac firmware.

Learn more

  • OS X El Capitan won't install on top of a later version of macOS, but you can erase your disk first or install on another disk.
  • You can use macOS Recovery to reinstall macOS.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.

Apple security documents reference vulnerabilities by CVE-ID when possible.

macOS Sierra 10.12.1, Security Update 2016-002 El Capitan, and Security Update 2016-006 Yosemite

Released October 24, 2016

AppleGraphicsControl

Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: A memory corruption issue was addressed through improved lock state checking.

CVE-2016-4662: Apple

AppleMobileFileIntegrity

Available for: macOS Sierra 10.12

Impact: A signed executable may substitute code with the same team ID

Office Patch For El Capitan Free

Description: A validation issue existed in the handling of code signatures. This issue was addressed through additional validation.

CVE-2016-7584: Mark Mentovai and Boris Vidolov of Google Inc.

Entry added November 27, 2016

AppleSMC

Available for: macOS Sierra 10.12

Impact: A local user may be able to elevate privileges

Description: A null pointer dereference was addressed through improved locking.

CVE-2016-4678: daybreaker@Minionz working with Trend Micro's Zero Day Initiative

ATS

Available for: macOS Sierra 10.12

Impact: Processing a maliciously crafted font file may lead to arbitrary code execution

Description: A memory corruption issue was addressed through improved memory handling.

CVE-2016-4667: Simon Huang of alipay, Thelongestusernameofall@gmail.com, Moony Li of TrendMicro, @Flyic

Entry updated October 27, 2016

ATS

Available for: macOS Sierra 10.12

Impact: A local user may be able to execute arbitrary code with additional privileges

Description: A memory corruption issue was addressed through improved memory handling.

CVE-2016-4674: Shrek_wzw of Qihoo 360 Nirvan Team

CFNetwork Proxies

Available for: macOS Sierra 10.12

Impact: An attacker in a privileged network position may be able to leak sensitive user information

Description: A phishing issue existed in the handling of proxy credentials. This issue was addressed by removing unsolicited proxy password authentication prompts.

CVE-2016-7579: Jerry Decime

Core Image

Available for: OS X El Capitan v10.11.6

Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution

Description: A memory corruption issue was addressed through improved input validation.

CVE-2016-4681: Ke Liu of Tencent's Xuanwu Lab

Entry added October 25, 2016

CoreGraphics

Available for: macOS Sierra 10.12

Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution

Description: A memory corruption issue was addressed through improved memory handling.

Apr 24, 2020  Your Mac also needs at least 2GB of memory and 12.5GB of available storage space, or up to 18.5GB of storage space when upgrading from OS X Yosemite or earlier. MacBook introduced in 2015 or later MacBook Air introduced in 2012 or later MacBook Pro introduced in 2012 or later Mac mini introduced in 2012 or later iMac introduced in 2012 or later. https://windowsomg.netlify.app/macos-mojave-for-macbook-2011.html.

CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent

FaceTime

Available for: macOS Sierra 10.12

Impact: An attacker in a privileged network position may be able to cause a relayed call to continue transmitting audio while appearing as if the call terminated

Description: User interface inconsistencies existed in the handling of relayed calls. These issues were addressed through improved protocol logic.

CVE-2016-7577: Martin Vigo (@martin_vigo) of salesforce.com

Entry added October 27, 2016

FontParser

Available for: macOS Sierra 10.12

Impact: Parsing a maliciously crafted font may disclose sensitive user information

Description: An out-of-bounds read was addressed through improved bounds checking.

CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab

FontParser

Available for: macOS Sierra 10.12

Impact: Processing a maliciously crafted font file may lead to arbitrary code execution

Description: A buffer overflow existed in the handling of font files. This issue was addressed through improved bounds checking.

CVE-2016-4688: Simon Huang of Alipay company, thelongestusernameofall@gmail.com

Entry added November 27, 2016

IDS - Connectivity

Available for: macOS Sierra 10.12

Impact: An attacker in a privileged network position may be able to trick a user on a multi-party call into believing they are talking to the other party

Description: An impersonation issue existed in the handling of call switching. This issue was addressed through improved handling of 'switch caller' notifications.

CVE-2016-4721: Martin Vigo (@martin_vigo) of salesforce.com

Entry added October 27, 2016

ImageIO

Available for: OS X El Capitan v10.11.6

Impact: Parsing a maliciously crafted PDF may lead to arbitrary code execution

Description: An out-of-bounds write was addressed through improved bounds checking.

CVE-2016-4671: Ke Liu of Tencent's Xuanwu Lab, Juwei Lin (@fuzzerDOTcn)

ImageIO

Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6

Impact: Processing a maliciously crafted image may result in the disclosure of process memory

Description: An out-of-bounds read issue existed in the SGI image parsing. This issue was addressed through improved bounds checking.

CVE-2016-4682: Ke Liu of Tencent's Xuanwu Lab

ImageIO

Available for: OS X El Capitan v10.11.6

Impact: A remote attacker may be able to execute arbitrary code

Description: Multiple out-of-bounds read and write issues exited in SGI parsing. These issues was addressed through improved input validation.

CVE-2016-4683: Ke Liu of Tencent’s Xuanwu Lab

Entry added October 25, 2016

Kernel

Available for: OS X Yosemite 10.10.5, OS X El Capitan 10.11.6, and macOS Sierra 10.12

Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel

Description: Multiple input validation issues existed in MIG generated code. These issues were addressed through improved validation.

CVE-2016-4669: Ian Beer of Google Project Zero

Entry updated November 2, 2016

Kernel

Samsung external hard drive. Available for: macOS Sierra 10.12

Impact: A local application may be able to execute arbitrary code with root privileges

Description: Multiple object lifetime issues existed when spawning new processes. These were addressed through improved validation.

CVE-2016-7613: Ian Beer of Google Project Zero

Entry added November 1, 2016

Office Patch For El Capitan 10

libarchive

Available for: macOS Sierra 10.12

Impact: A malicious archive may be able to overwrite arbitrary files

Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.

CVE-2016-4679: Omer Medan of enSilo Ltd

libxpc

Available for: macOS Sierra 10.12

Impact: An application may be able to execute arbitrary code with root privileges

Description: A logic issue was addressed through additional restrictions.

CVE-2016-4675: Ian Beer of Google Project Zero

Entry updated March 30, 2017

ntfs

Office Patch For El Capitan Ecuador

Available for: macOS Sierra 10.12

Impact: An application may be able to cause a denial of service

Description: An issue existed in the parsing of disk images. This issue was addressed through improved validation.

CVE-2016-4661: Recurity Labs on behalf of BSI (German Federal Office for Information Security)

NVIDIA Graphics Drivers

Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6

Impact: An application may be able to cause a denial of service

Description: A memory corruption issue was addressed through improved input validation.

CVE-2016-4663: Apple

Security

Available for: macOS Sierra 10.12

Impact: A local attacker can observe the length of a login password when a user logs in

Description: A logging issue existed in the handling of passwords. This issue was addressed by removing password length logging.

CVE-2016-4670: Daniel Jalkut of Red Sweater Software

Entry updated October 25, 2016

Thunderbolt

Available for: macOS Sierra 10.12

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: A null pointer dereference was addressed through improved input validation.

CVE-2016-4780: sweetchip of Grayhash

Entry added November 29, 2016

macOS Sierra 10.12.1 includes the security content of Safari 10.0.1.