Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2014-AVI-487
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "iOS 8.1.0", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "OS X Yosemite v10.10", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple TV 7.0.1", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2014-4462", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4462" }, { "name": "CVE-2014-4452", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4452" }, { "name": "CVE-2014-4455", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4455" }, { "name": "CVE-2014-4459", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4459" }, { "name": "CVE-2014-4451", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4451" }, { "name": "CVE-2014-4463", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4463" }, { "name": "CVE-2014-4453", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4453" }, { "name": "CVE-2014-4458", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4458" }, { "name": "CVE-2014-4460", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4460" }, { "name": "CVE-2014-4461", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4461" }, { "name": "CVE-2014-4457", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4457" } ], "initial_release_date": "2014-11-18T00:00:00", "last_revision_date": "2014-11-18T00:00:00", "links": [], "reference": "CERTFR-2014-AVI-487", "revisions": [ { "description": "version initiale.", "revision_date": "2014-11-18T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une ex\u00e9cution de code arbitraire et un contournement de la\npolitique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT6592 du 17 novembre 2014", "url": "https://support.apple.com/en-us/HT6592" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT6591 du 17 novembre 2014", "url": "https://support.apple.com/en-us/HT6591" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT6590 du 17 novembre 2014", "url": "https://support.apple.com/en-us/HT6590" } ] }
CVE-2014-4458 (GCVE-0-2014-4458)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The "System Profiler About This Mac" component in Apple OS X before 10.10.1 includes extraneous cookie data in system-model requests, which might allow remote attackers to obtain sensitive information via unspecified vectors.
References
URL | Tags | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:25.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1031230", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031230" }, { "name": "62503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62503" }, { "name": "macosx-cve20144458-info-disc(98785)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98785" }, { "name": "71139", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71139" }, { "name": "APPLE-SA-2014-11-17-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204419" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6591" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The \"System Profiler About This Mac\" component in Apple OS X before 10.10.1 includes extraneous cookie data in system-model requests, which might allow remote attackers to obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "1031230", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031230" }, { "name": "62503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62503" }, { "name": "macosx-cve20144458-info-disc(98785)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98785" }, { "name": "71139", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71139" }, { "name": "APPLE-SA-2014-11-17-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204419" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6591" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4458", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The \"System Profiler About This Mac\" component in Apple OS X before 10.10.1 includes extraneous cookie data in system-model requests, which might allow remote attackers to obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1031230", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031230" }, { "name": "62503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62503" }, { "name": "macosx-cve20144458-info-disc(98785)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98785" }, { "name": "71139", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71139" }, { "name": "APPLE-SA-2014-11-17-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "name": "https://support.apple.com/en-us/HT204419", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204419" }, { "name": "https://support.apple.com/en-us/HT6591", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6591" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4458", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:25.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4461 (GCVE-0-2014-4461)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The kernel in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly validate IOSharedDataQueue object metadata, which allows attackers to execute arbitrary code in a privileged context via a crafted application.
References
URL | Tags | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:25.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "APPLE-SA-2014-11-17-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "appletv-cve20144461-code-exec(98774)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98774" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "71136", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71136" }, { "name": "1031231", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031231" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204244" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204420" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6592" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The kernel in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly validate IOSharedDataQueue object metadata, which allows attackers to execute arbitrary code in a privileged context via a crafted application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "APPLE-SA-2014-11-17-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "appletv-cve20144461-code-exec(98774)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98774" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "71136", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71136" }, { "name": "1031231", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031231" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204244" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204420" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6592" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly validate IOSharedDataQueue object metadata, which allows attackers to execute arbitrary code in a privileged context via a crafted application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2014-11-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "APPLE-SA-2014-11-17-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "appletv-cve20144461-code-exec(98774)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98774" }, { "name": "https://support.apple.com/en-us/HT6590", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6590" }, { "name": "71136", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71136" }, { "name": "1031231", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031231" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "https://support.apple.com/en-us/HT204420", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204420" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "https://support.apple.com/en-us/HT204418", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204418" }, { "name": "https://support.apple.com/en-us/HT6592", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6592" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4461", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:25.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4455 (GCVE-0-2014-4455)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
dyld in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly handle overlapping segments in Mach-O executable files, which allows local users to bypass intended code-signing restrictions via a crafted file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:25.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204245" }, { "name": "APPLE-SA-2014-11-17-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204246" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "1031231", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031231" }, { "name": "APPLE-SA-2015-01-27-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html" }, { "name": "appletv-cve20144455-code-exec(98773)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98773" }, { "name": "APPLE-SA-2015-01-27-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html" }, { "name": "71140", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71140" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6592" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "dyld in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly handle overlapping segments in Mach-O executable files, which allows local users to bypass intended code-signing restrictions via a crafted file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204245" }, { "name": "APPLE-SA-2014-11-17-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204246" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "1031231", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031231" }, { "name": "APPLE-SA-2015-01-27-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html" }, { "name": "appletv-cve20144455-code-exec(98773)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98773" }, { "name": "APPLE-SA-2015-01-27-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html" }, { "name": "71140", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71140" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6592" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dyld in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly handle overlapping segments in Mach-O executable files, which allows local users to bypass intended code-signing restrictions via a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2014-11-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "http://support.apple.com/HT204245", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204245" }, { "name": "APPLE-SA-2014-11-17-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "http://support.apple.com/HT204246", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204246" }, { "name": "https://support.apple.com/en-us/HT6590", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6590" }, { "name": "1031231", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031231" }, { "name": "APPLE-SA-2015-01-27-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html" }, { "name": "appletv-cve20144455-code-exec(98773)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98773" }, { "name": "APPLE-SA-2015-01-27-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html" }, { "name": "71140", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71140" }, { "name": "https://support.apple.com/en-us/HT204420", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204420" }, { "name": "https://support.apple.com/en-us/HT204418", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204418" }, { "name": "https://support.apple.com/en-us/HT6592", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6592" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4455", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:25.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4459 (GCVE-0-2014-4459)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Use-after-free vulnerability in WebKit, as used in Apple OS X before 10.10.1, allows remote attackers to execute arbitrary code via crafted page objects in an HTML document.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:25.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204245" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204246" }, { "name": "APPLE-SA-2015-06-30-6", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html" }, { "name": "1031230", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031230" }, { "name": "62503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62503" }, { "name": "APPLE-SA-2014-11-17-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204419" }, { "name": "APPLE-SA-2015-01-27-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html" }, { "name": "71144", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71144" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT204949" }, { "name": "APPLE-SA-2015-01-27-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6596" }, { "name": "APPLE-SA-2014-12-2-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6591" }, { "name": "macosx-cve20144459-code-exec(98784)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98784" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in WebKit, as used in Apple OS X before 10.10.1, allows remote attackers to execute arbitrary code via crafted page objects in an HTML document." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204245" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204246" }, { "name": "APPLE-SA-2015-06-30-6", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html" }, { "name": "1031230", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031230" }, { "name": "62503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62503" }, { "name": "APPLE-SA-2014-11-17-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204419" }, { "name": "APPLE-SA-2015-01-27-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html" }, { "name": "71144", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71144" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT204949" }, { "name": "APPLE-SA-2015-01-27-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6596" }, { "name": "APPLE-SA-2014-12-2-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6591" }, { "name": "macosx-cve20144459-code-exec(98784)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98784" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4459", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in WebKit, as used in Apple OS X before 10.10.1, allows remote attackers to execute arbitrary code via crafted page objects in an HTML document." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.apple.com/HT204245", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204245" }, { "name": "http://support.apple.com/HT204246", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204246" }, { "name": "APPLE-SA-2015-06-30-6", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html" }, { "name": "1031230", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031230" }, { "name": "62503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62503" }, { "name": "APPLE-SA-2014-11-17-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "name": "https://support.apple.com/en-us/HT204419", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204419" }, { "name": "APPLE-SA-2015-01-27-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html" }, { "name": "71144", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71144" }, { "name": "https://support.apple.com/kb/HT204949", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT204949" }, { "name": "APPLE-SA-2015-01-27-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html" }, { "name": "http://support.apple.com/kb/HT6596", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6596" }, { "name": "APPLE-SA-2014-12-2-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html" }, { "name": "https://support.apple.com/en-us/HT6591", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6591" }, { "name": "macosx-cve20144459-code-exec(98784)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98784" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4459", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:25.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4463 (GCVE-0-2014-4463)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apple iOS before 8.1.1 allows physically proximate attackers to bypass the lock-screen protection mechanism, and view or transmit a Photo Library photo, via the FaceTime "Leave a Message" feature.
References
URL | Tags | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:26.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "71141", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71141" }, { "name": "appleios-cve20144463-sec-bypass(98778)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98778" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62504" }, { "name": "1031232", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031232" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204418" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Apple iOS before 8.1.1 allows physically proximate attackers to bypass the lock-screen protection mechanism, and view or transmit a Photo Library photo, via the FaceTime \"Leave a Message\" feature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "71141", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71141" }, { "name": "appleios-cve20144463-sec-bypass(98778)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98778" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62504" }, { "name": "1031232", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031232" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204418" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4463", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apple iOS before 8.1.1 allows physically proximate attackers to bypass the lock-screen protection mechanism, and view or transmit a Photo Library photo, via the FaceTime \"Leave a Message\" feature." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2014-11-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "71141", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71141" }, { "name": "appleios-cve20144463-sec-bypass(98778)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98778" }, { "name": "https://support.apple.com/en-us/HT6590", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6590" }, { "name": "62504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62504" }, { "name": "1031232", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031232" }, { "name": "https://support.apple.com/en-us/HT204418", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204418" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4463", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:26.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4453 (GCVE-0-2014-4453)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apple iOS before 8.1.1 and OS X before 10.10.1 include location data during establishment of a Spotlight Suggestions server connection by Spotlight or Safari, which might allow remote attackers to obtain sensitive information via unspecified vectors.
References
URL | Tags | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:25.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "71135", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71135" }, { "name": "1031230", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031230" }, { "name": "62503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "APPLE-SA-2014-11-17-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204419" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62504" }, { "name": "macos-cve20144453-info-disc(98782)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98782" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6591" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Apple iOS before 8.1.1 and OS X before 10.10.1 include location data during establishment of a Spotlight Suggestions server connection by Spotlight or Safari, which might allow remote attackers to obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "71135", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71135" }, { "name": "1031230", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031230" }, { "name": "62503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "APPLE-SA-2014-11-17-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204419" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62504" }, { "name": "macos-cve20144453-info-disc(98782)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98782" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6591" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4453", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apple iOS before 8.1.1 and OS X before 10.10.1 include location data during establishment of a Spotlight Suggestions server connection by Spotlight or Safari, which might allow remote attackers to obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2014-11-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "71135", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71135" }, { "name": "1031230", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031230" }, { "name": "62503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62503" }, { "name": "https://support.apple.com/en-us/HT6590", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6590" }, { "name": "APPLE-SA-2014-11-17-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "name": "https://support.apple.com/en-us/HT204419", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204419" }, { "name": "62504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62504" }, { "name": "macos-cve20144453-info-disc(98782)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98782" }, { "name": "https://support.apple.com/en-us/HT204418", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204418" }, { "name": "https://support.apple.com/en-us/HT6591", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6591" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4453", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:25.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4457 (GCVE-0-2014-4457)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Sandbox Profiles subsystem in Apple iOS before 8.1.1 does not properly implement the debugserver sandbox, which allows attackers to bypass intended binary-execution restrictions via a crafted application that is run during a time period when debugging is not enabled.
References
URL | Tags | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:25.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "appleios-cve20144457-sec-bypass(98777)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98777" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "71143", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71143" }, { "name": "1031232", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031232" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204418" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Sandbox Profiles subsystem in Apple iOS before 8.1.1 does not properly implement the debugserver sandbox, which allows attackers to bypass intended binary-execution restrictions via a crafted application that is run during a time period when debugging is not enabled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "appleios-cve20144457-sec-bypass(98777)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98777" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "71143", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71143" }, { "name": "1031232", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031232" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204418" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4457", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Sandbox Profiles subsystem in Apple iOS before 8.1.1 does not properly implement the debugserver sandbox, which allows attackers to bypass intended binary-execution restrictions via a crafted application that is run during a time period when debugging is not enabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2014-11-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "appleios-cve20144457-sec-bypass(98777)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98777" }, { "name": "https://support.apple.com/en-us/HT6590", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6590" }, { "name": "71143", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71143" }, { "name": "1031232", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031232" }, { "name": "https://support.apple.com/en-us/HT204418", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204418" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4457", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:25.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4462 (GCVE-0-2014-4462)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452.
References
URL | Tags | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:26.036Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "APPLE-SA-2014-11-17-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "62505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62505" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "1031231", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031231" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62504" }, { "name": "appletv-cve20144462-code-exec(98772)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98772" }, { "name": "71142", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71142" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6592" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "APPLE-SA-2014-11-17-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "62505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62505" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "1031231", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031231" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62504" }, { "name": "appletv-cve20144462-code-exec(98772)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98772" }, { "name": "71142", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71142" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6592" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4462", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2014-11-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "APPLE-SA-2014-11-17-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "62505", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62505" }, { "name": "https://support.apple.com/en-us/HT6590", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6590" }, { "name": "1031231", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031231" }, { "name": "62504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62504" }, { "name": "appletv-cve20144462-code-exec(98772)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98772" }, { "name": "71142", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71142" }, { "name": "https://support.apple.com/en-us/HT204418", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204418" }, { "name": "https://support.apple.com/en-us/HT6592", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6592" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4462", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:26.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4451 (GCVE-0-2014-4451)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apple iOS before 8.1.1 does not properly enforce the failed-passcode limit, which makes it easier for physically proximate attackers to bypass the lock-screen protection mechanism via a series of guesses.
References
URL | Tags | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:25.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "appleios-cve20144451-sec-bypass(98776)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98776" }, { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62504" }, { "name": "71138", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71138" }, { "name": "1031232", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031232" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204418" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Apple iOS before 8.1.1 does not properly enforce the failed-passcode limit, which makes it easier for physically proximate attackers to bypass the lock-screen protection mechanism via a series of guesses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "appleios-cve20144451-sec-bypass(98776)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98776" }, { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62504" }, { "name": "71138", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71138" }, { "name": "1031232", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031232" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204418" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4451", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apple iOS before 8.1.1 does not properly enforce the failed-passcode limit, which makes it easier for physically proximate attackers to bypass the lock-screen protection mechanism via a series of guesses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "appleios-cve20144451-sec-bypass(98776)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98776" }, { "name": "APPLE-SA-2014-11-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "https://support.apple.com/en-us/HT6590", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6590" }, { "name": "62504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62504" }, { "name": "71138", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71138" }, { "name": "1031232", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031232" }, { "name": "https://support.apple.com/en-us/HT204418", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204418" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4451", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:25.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4460 (GCVE-0-2014-4460)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
CFNetwork in Apple iOS before 8.1.1 and OS X before 10.10.1 does not properly clear the browsing cache upon a transition out of private-browsing mode, which makes it easier for physically proximate attackers to obtain sensitive information by reading cache files.
References
URL | Tags | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:25.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "71135", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71135" }, { "name": "1031230", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031230" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "APPLE-SA-2014-11-17-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204419" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204244" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "macosx-cve20144460-info-disc(98783)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98783" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6591" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "CFNetwork in Apple iOS before 8.1.1 and OS X before 10.10.1 does not properly clear the browsing cache upon a transition out of private-browsing mode, which makes it easier for physically proximate attackers to obtain sensitive information by reading cache files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "71135", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71135" }, { "name": "1031230", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031230" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "APPLE-SA-2014-11-17-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204419" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204244" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "macosx-cve20144460-info-disc(98783)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98783" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6591" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4460", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CFNetwork in Apple iOS before 8.1.1 and OS X before 10.10.1 does not properly clear the browsing cache upon a transition out of private-browsing mode, which makes it easier for physically proximate attackers to obtain sensitive information by reading cache files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2014-11-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "71135", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71135" }, { "name": "1031230", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031230" }, { "name": "https://support.apple.com/en-us/HT6590", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6590" }, { "name": "APPLE-SA-2014-11-17-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html" }, { "name": "https://support.apple.com/en-us/HT204419", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204419" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "macosx-cve20144460-info-disc(98783)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98783" }, { "name": "https://support.apple.com/en-us/HT204418", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204418" }, { "name": "https://support.apple.com/en-us/HT6591", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6591" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4460", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:25.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-4452 (GCVE-0-2014-4452)
Vulnerability from cvelistv5
Published
2014-11-18 11:00
Modified
2024-08-06 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4462.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:25.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "APPLE-SA-2014-11-17-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "62505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62505" }, { "name": "APPLE-SA-2015-06-30-6", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "1031231", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031231" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT204949" }, { "name": "appletv-cve20144452-code-exec(98771)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98771" }, { "name": "71137", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71137" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6596" }, { "name": "APPLE-SA-2014-12-2-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/en-us/HT6592" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4462." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2014-11-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "APPLE-SA-2014-11-17-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "62505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62505" }, { "name": "APPLE-SA-2015-06-30-6", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6590" }, { "name": "1031231", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031231" }, { "name": "62504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT204949" }, { "name": "appletv-cve20144452-code-exec(98771)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98771" }, { "name": "71137", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71137" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6596" }, { "name": "APPLE-SA-2014-12-2-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT204418" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/en-us/HT6592" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2014-4452", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4462." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2014-11-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html" }, { "name": "APPLE-SA-2014-11-17-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html" }, { "name": "62505", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62505" }, { "name": "APPLE-SA-2015-06-30-6", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html" }, { "name": "https://support.apple.com/en-us/HT6590", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6590" }, { "name": "1031231", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031231" }, { "name": "62504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62504" }, { "name": "https://support.apple.com/kb/HT204949", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT204949" }, { "name": "appletv-cve20144452-code-exec(98771)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98771" }, { "name": "71137", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71137" }, { "name": "http://support.apple.com/kb/HT6596", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6596" }, { "name": "APPLE-SA-2014-12-2-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html" }, { "name": "https://support.apple.com/en-us/HT204420", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204420" }, { "name": "https://support.apple.com/en-us/HT204418", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT204418" }, { "name": "https://support.apple.com/en-us/HT6592", "refsource": "CONFIRM", "url": "https://support.apple.com/en-us/HT6592" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4452", "datePublished": "2014-11-18T11:00:00", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2024-08-06T11:20:25.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…