The extension APIs in the kernel in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 do not prevent the presence of addresses within an OSBundleMachOHeaders key in a response, which makes it easier for attackers to bypass the ASLR protection mechanism via a crafted app.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html | Vendor Advisory |
http://support.apple.com/HT204244 | Vendor Advisory |
http://support.apple.com/HT204245 | Vendor Advisory |
http://support.apple.com/HT204246 | Vendor Advisory |
http://www.securitytracker.com/id/1031650 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2015-01-30 11:59
Updated : 2024-02-04 18:35
NVD link : CVE-2014-4491
Mitre link : CVE-2014-4491
CVE.ORG link : CVE-2014-4491
JSON object : View
Products Affected
apple
- mac_os_x
- iphone_os
- tvos
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor