Vulnerability CVE-2014-4496


Published: 2015-01-30

Description:
The mach_port_kobject interface in the kernel in Apple iOS before 8.1.3 and Apple TV before 7.0.3 does not properly restrict kernel-address and heap-permutation information, which makes it easier for attackers to bypass the ASLR protection mechanism via a crafted app.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Apple -> Apple tv 
Apple -> Iphone os 
Apple -> TVOS 

 References:
http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html
http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html
http://support.apple.com/HT204245
http://support.apple.com/HT204246
http://www.securityfocus.com/bid/72334
http://www.securitytracker.com/id/1031652
https://support.apple.com/HT204413

Copyright 2024, cxsecurity.com

 

Back to Top