The mach_port_kobject interface in the kernel in Apple iOS before 8.1.3 and Apple TV before 7.0.3 does not properly restrict kernel-address and heap-permutation information, which makes it easier for attackers to bypass the ASLR protection mechanism via a crafted app.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:10
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html - Mailing List, Vendor Advisory | |
| References | () http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html - Mailing List, Vendor Advisory | |
| References | () http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html - Mailing List, Vendor Advisory | |
| References | () http://support.apple.com/HT204245 - Vendor Advisory | |
| References | () http://support.apple.com/HT204246 - Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/72334 - | |
| References | () http://www.securitytracker.com/id/1031652 - Third Party Advisory, VDB Entry | |
| References | () https://support.apple.com/HT204413 - Vendor Advisory | 
Information
                Published : 2015-01-30 11:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-4496
Mitre link : CVE-2014-4496
CVE.ORG link : CVE-2014-4496
JSON object : View
Products Affected
                apple
- tvos
- iphone_os
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
