For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the [Apple Product Security](<https://www.apple.com/support/security/>) website. For information about the Apple Product Security PGP Key, see [How to use the Apple Product Security PGP Key](<https://support.apple.com/kb/HT201601>). Where possible, [CVE IDs](<http://cve.mitre.org/about/>) are used to reference the vulnerabilities for further information. To learn about other security updates, see [Apple security updates](<https://support.apple.com/kb/HT201222>). ## AirPort Base Station Firmware Update 7.6.7 and 7.7.7 * **AirPort Base Station Firmware** Available for: AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations with 802.11n; AirPort Extreme and AirPort Time Capsule base stations with 802.11ac Impact: A remote attacker may be able to cause arbitrary code execution Description: A memory corruption issue existed in DNS data parsing. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-7029 : Alexandre Helie ## Installation note for AirPort Base Station Firmware Update 7.6.7 and 7.7.7 Firmware version 7.6.7 and 7.7.7 is installed on AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations with 802.11n as well as AirPort Extreme and AirPort Time Capsule base stations with 802.11ac using AirPort Utility for Mac or iOS. Use AirPort Utility 6.3.1 or later on OS X or AirPort Utility 1.3.1 or later on iOS to upgrade to Firmware version 7.6.7 and 7.7.7. AirPort Utility for Mac is a free download from the [Apple Downloads page](<http://support.apple.com/downloads/>) and AirPort Utility for iOS is a free download from the [App Store](<https://support.apple.com/kb/HT204266>).
|airport base station firmware update||7.6.7|