CVE-2014-1320
Published Apr 23, 2014
Last updated 6 years ago
Overview
- Description
- IOKit in Apple iOS before 7.1.1, Apple OS X through 10.9.2, and Apple TV before 6.1.1 places kernel pointers into an object data structure, which makes it easier for local users to bypass the ASLR protection mechanism by reading unspecified attributes of the object.
- Source
- product-security@apple.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 6.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FB1A2F7-1084-4786-848A-91E201B98AB6", "versionEndIncluding": "10.9.2" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A48A5310-A589-4E9B-99BC-F840CC1A6A44" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F241EBFB-CCB3-4D16-B476-AC1578D3C435" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "416E8374-1E96-4F30-8270-CC71EBD96257", "versionEndIncluding": "7.1" }, { "criteria": "cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07A11433-B725-4BD6-B998-4B3637F061EC" }, { "criteria": "cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FD62141-07B1-4E3D-80BC-25D519F90DBD" }, { "criteria": "cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9737BD4-B4F4-4291-A1E9-B692ECBC657E" }, { "criteria": "cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6160869-944D-4E34-BB81-6A1259D692B1" }, { "criteria": "cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "090CAC3C-4B20-46E5-A8C7-950B7E1DB5E9" }, { "criteria": "cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E96F77DD-0962-4E55-97A2-9BC2FE01D8A8" }, { "criteria": "cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BD9ACBF-34A4-4181-A6E0-78ABD4FC9ACB" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF977CDC-9F9B-4F56-A488-061A67981716", "versionEndIncluding": "6.1" }, { "criteria": "cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5365205F-B91D-4123-8CFD-EA42E0DEA944" }, { "criteria": "cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8C7F676-5ACC-4330-9591-465CA8AF77AA" }, { "criteria": "cpe:2.3:o:apple:tvos:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5314D7F-8352-41F5-A155-5E5392C58ABF" } ], "operator": "OR" } ] } ]