Vulnerability CVE-2014-4492


Published: 2015-01-30

Description:
libnetcore in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not verify that certain values have the expected data type, which allows attackers to execute arbitrary code in an _networkd context via a crafted XPC message from a sandboxed app, as demonstrated by lack of verification of the XPC dictionary data type.

Type:

CWE-19

(Data Handling)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Apple -> Apple tv 
Apple -> Iphone os 
Apple -> Mac os x 
Apple -> TVOS 

 References:
http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html
http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://packetstormsecurity.com/files/134393/Mac-OS-X-Networkd-XPC-Type-Confusion-Sandbox-Escape.html
http://support.apple.com/HT204244
http://support.apple.com/HT204245
http://support.apple.com/HT204246
http://www.exploit-db.com/exploits/35847
https://code.google.com/p/google-security-research/issues/detail?id=92

Copyright 2024, cxsecurity.com

 

Back to Top