ID CVE-2014-4472
Summary WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.
References
Vulnerable Configurations
  • cpe:2.3:a:apple:safari:6.2.0
    cpe:2.3:a:apple:safari:6.2.0
  • Apple Safari 7.0
    cpe:2.3:a:apple:safari:7.0
  • Apple Safari 7.0.1
    cpe:2.3:a:apple:safari:7.0.1
  • Apple Safari 7.0.2
    cpe:2.3:a:apple:safari:7.0.2
  • Apple Safari 7.0.3
    cpe:2.3:a:apple:safari:7.0.3
  • Apple Safari 7.0.4
    cpe:2.3:a:apple:safari:7.0.4
  • Apple Safari 7.0.5
    cpe:2.3:a:apple:safari:7.0.5
  • cpe:2.3:a:apple:safari:7.0.6
    cpe:2.3:a:apple:safari:7.0.6
  • cpe:2.3:a:apple:safari:7.1.0
    cpe:2.3:a:apple:safari:7.1.0
  • cpe:2.3:a:apple:safari:8.0.0
    cpe:2.3:a:apple:safari:8.0.0
  • Apple tvOS 7.0.1
    cpe:2.3:o:apple:tvos:7.0.1
  • Apple iPhone OS 8.1.2
    cpe:2.3:o:apple:iphone_os:8.1.2
  • Apple iTunes 12.1
    cpe:2.3:a:apple:itunes:12.1
CVSS
Base: 6.8 (as of 24-07-2015 - 13:55)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Misc.
    NASL id APPLETV_7_0_3.NASL
    description According to its banner, the remote Apple TV device is a version prior to 7.0.3. It is, therefore, affected by the following vulnerabilities : - Multiple memory corruption issues exist, related to the included version of WebKit, that allow application crashes or arbitrary code execution. (CVE-2014-3192, CVE-2014-4459, CVE-2014-4466, CVE-2014-4468, CVE-2014-4469, CVE-2014-4470, CVE-2014-4471, CVE-2014-4472, CVE-2014-4473, CVE-2014-4474, CVE-2014-4475, CVE-2014-4476, CVE-2014-4477, CVE-2014-4479) - A state management issue exists due to improperly handling overlapping segments in Mach-O executable files. A local user can exploit this issue to execute unsigned code. (CVE-2014-4455) - A security bypass issue exists due to improper validation of SVG files loaded in an IMG element. An attacker can load a CSS of cross-origin resulting in information disclosure. (CVE-2014-4465) - An issue exists due to the symbolic linking performed by the 'afc' command which allows an attacker to access arbitrary files on the system. (CVE-2014-4480) - An integer overflow issue exists due to improper bounds checking when processing PDF files. (CVE-2014-4481) - A buffer overflow issue exists due to improper bounds checking when processing fonts in PDF files. (CVE-2014-4483) - A memory corruption issue exists due to improper bounds checking when processing '.dfont' files. (CVE-2014-4484) - A buffer overflow issue exists due to improper bounds checking when processing XML files. (CVE-2014-4485) - A null pointer dereference issue exists due to the handling of resource lists in the IOAcceleratorFamily kernel extension. (CVE-2014-4486) - A buffer overflow issue exists due to improper size validation in the IOHIDFamily. (CVE-2014-4487) - A validation issue exists due to the handling of resource queue metadata in the IOHIDFamily kernel extension. (CVE-2014-4488) - A null pointer dereference issue exists due to the handling of event queues in the IOHIDFamily kernel extension. (CVE-2014-4489) - An information disclosure issue exists due to the handling of APIs related to kernel extensions in which kernel addresses may be revealed. An attacker can leverage this to bypass ASLR protections. (CVE-2014-4491) - Multiple type confusion issues exists due to improper type checking during interprocess communication in the network daemon (networkd). (CVE-2014-4492) - An issue exists due to improper checking of shared memory permissions in the kernel shared memory subsystem. (CVE-2014-4495) - An information disclosure issue exists due to mach_port_kobject kernel interface leaking kernel addresses and heap permutation values. An attacker can leverage this to bypass ASLR protections. (CVE-2014-4496) Note that arbitrary code execution is possible with the above issues assigned CVE-2014-4481 through CVE-2014-4489, CVE-2014-4492, and CVE-2014-4495.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 81145
    published 2015-02-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81145
    title Apple TV < 7.0.3 Multiple Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SAFARI8_0_2.NASL
    description The version of Apple Safari installed on the remote Mac OS X host is a version prior to 6.2.2 / 7.1.2 / 8.0.2. It is, therefore, affected by the following vulnerabilities in WebKit : - An SVG loaded in an IMG element could load a CSS file cross-origin. This can allow data exfiltration. (CVE-2014-4465) - A UI spoofing flaw exists in the handling of scrollbar boundaries. Visiting websites that frame malicious content can allow the UI to be spoofed. (CVE-2014-1748) - Multiple memory corruption issues exist that can lead to an unexpected application crash or potential arbitrary code execution by means of malicious website content. (CVE-2014-4452, CVE-2014-4459, CVE-2014-4466, CVE-2014-4468, CVE-2014-4469, CVE-2014-4470, CVE-2014-4471, CVE-2014-4472, CVE-2014-4473, CVE-2014-4474, CVE-2014-4475) Note that the 6.2.2 / 7.1.2 / 8.0.2 Safari updates include the security content of the 6.2.1 / 7.1.1 / 8.0.1 updates. These more recent updates, however, were released to fix potential issues with the installation of the previous patch release.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 80055
    published 2014-12-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80055
    title Mac OS X : Apple Safari < 6.2.2 / 7.1.2 / 8.0.2 Multiple Vulnerabilities
  • NASL family Windows
    NASL id ITUNES_12_2_0.NASL
    description The version of Apple iTunes installed on the remote Windows host is prior to 12.2. It is, therefore, affected by multiple vulnerabilities in the bundled version of WebKit, including denial of service and arbitrary code execution vulnerabilities. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 84504
    published 2015-07-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84504
    title Apple iTunes < 12.2 Multiple Vulnerabilities (credentialed check)
  • NASL family Peer-To-Peer File Sharing
    NASL id ITUNES_12_2_0_BANNER.NASL
    description The version of Apple iTunes running on the remote host is prior to 12.2. It is, therefore, affected by multiple vulnerabilities due to memory corruption issues in the WebKit component. An attacker can exploit these to cause a denial of service or execute arbitrary code. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 86600
    published 2015-10-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86600
    title Apple iTunes < 12.2 Multiple Vulnerabilities (uncredentialed check)
refmap via4
apple
  • APPLE-SA-2014-12-2-1
  • APPLE-SA-2015-01-27-1
  • APPLE-SA-2015-01-27-2
  • APPLE-SA-2015-06-30-6
bid 71442
confirm
Last major update 28-11-2016 - 14:12
Published 10-12-2014 - 16:59
Last modified 08-03-2019 - 11:06
Back to Top