CVE-2014-4492

HIGH

Description

libnetcore in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not verify that certain values have the expected data type, which allows attackers to execute arbitrary code in an _networkd context via a crafted XPC message from a sandboxed app, as demonstrated by lack of verification of the XPC dictionary data type.

References

http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html

http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html

http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html

http://packetstormsecurity.com/files/134393/Mac-OS-X-Networkd-XPC-Type-Confusion-Sandbox-Escape.html

http://support.apple.com/HT204244

http://support.apple.com/HT204245

http://support.apple.com/HT204246

http://www.exploit-db.com/exploits/35847

http://www.osvdb.org/114862

https://code.google.com/p/google-security-research/issues/detail?id=92

Details

Source: MITRE

Published: 2015-01-30

Updated: 2019-03-08

Type: CWE-19

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH