The mach_port_kobject interface in the kernel in Apple iOS before 8.1.3 and Apple TV before 7.0.3 does not properly restrict kernel-address and heap-permutation information, which makes it easier for attackers to bypass the ASLR protection mechanism via a crafted app.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html - Mailing List, Vendor Advisory | |
References | () http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html - Mailing List, Vendor Advisory | |
References | () http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html - Mailing List, Vendor Advisory | |
References | () http://support.apple.com/HT204245 - Vendor Advisory | |
References | () http://support.apple.com/HT204246 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/72334 - | |
References | () http://www.securitytracker.com/id/1031652 - Third Party Advisory, VDB Entry | |
References | () https://support.apple.com/HT204413 - Vendor Advisory |
Information
Published : 2015-01-30 11:59
Updated : 2024-11-21 02:10
NVD link : CVE-2014-4496
Mitre link : CVE-2014-4496
CVE.ORG link : CVE-2014-4496
JSON object : View
Products Affected
apple
- iphone_os
- tvos
CWE
CWE-264
Permissions, Privileges, and Access Controls