The mach_port_kobject interface in the kernel in Apple iOS before 8.1.3 and Apple TV before 7.0.3 does not properly restrict kernel-address and heap-permutation information, which makes it easier for attackers to bypass the ASLR protection mechanism via a crafted app.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html | Mailing List Vendor Advisory |
http://support.apple.com/HT204246 | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html | Mailing List Vendor Advisory |
http://support.apple.com/HT204245 | Vendor Advisory |
http://www.securitytracker.com/id/1031652 | Third Party Advisory VDB Entry |
http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html | Mailing List Vendor Advisory |
https://support.apple.com/HT204413 | Vendor Advisory |
http://www.securityfocus.com/bid/72334 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2015-01-30 03:59
Updated : 2019-03-08 08:06
NVD link : CVE-2014-4496
Mitre link : CVE-2014-4496
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
apple
- iphone_os
- tvos