libnetcore in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not verify that certain values have the expected data type, which allows attackers to execute arbitrary code in an _networkd context via a crafted XPC message from a sandboxed app, as demonstrated by lack of verification of the XPC dictionary data type.
http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html
http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://packetstormsecurity.com/files/134393/Mac-OS-X-Networkd-XPC-Type-Confusion-Sandbox-Escape.html
http://support.apple.com/HT204244
http://support.apple.com/HT204245
http://support.apple.com/HT204246
http://www.exploit-db.com/exploits/35847
https://code.google.com/p/google-security-research/issues/detail?id=92