CVE-2014-4496

MEDIUM

Description

The mach_port_kobject interface in the kernel in Apple iOS before 8.1.3 and Apple TV before 7.0.3 does not properly restrict kernel-address and heap-permutation information, which makes it easier for attackers to bypass the ASLR protection mechanism via a crafted app.

References

http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html

http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html

http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html

http://support.apple.com/HT204245

http://support.apple.com/HT204246

http://www.securityfocus.com/bid/72334

http://www.securitytracker.com/id/1031652

https://support.apple.com/HT204413

Details

Source: MITRE

Published: 2015-01-30

Updated: 2019-03-08

Type: CWE-264

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM