CVE-2014-1256CVE-2014-1256

Affected configuration(s):

cpe:/o:apple:mac_os_x:10.7.0
cpe:/o:apple:mac_os_x:10.7.1
cpe:/o:apple:mac_os_x:10.7.2
cpe:/o:apple:mac_os_x:10.7.3
cpe:/o:apple:mac_os_x:10.7.4
cpe:/o:apple:mac_os_x:10.7.5
cpe:/o:apple:mac_os_x:10.8.0
cpe:/o:apple:mac_os_x:10.8.1
cpe:/o:apple:mac_os_x:10.8.2
cpe:/o:apple:mac_os_x:10.8.3
cpe:/o:apple:mac_os_x:10.8.4
cpe:/o:apple:mac_os_x:10.8.5
cpe:/o:apple:mac_os_x:10.8.5:supplemental_update
cpe:/o:apple:mac_os_x:10.9
cpe:/o:apple:mac_os_x:10.9.1
cpe:/o:apple:mac_os_x_server:10.7.0
cpe:/o:apple:mac_os_x_server:10.7.1
cpe:/o:apple:mac_os_x_server:10.7.2
cpe:/o:apple:mac_os_x_server:10.7.3
cpe:/o:apple:mac_os_x_server:10.7.4
cpe:/o:apple:mac_os_x_server:10.7.5

Date published: 2014-02-26T20:55:03.867-05:00

Date last modified: 2014-02-27T14:38:01.080-05:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://support.apple.com/kb/HT6150

Summary: Buffer overflow in Apple Type Services (ATS) in Apple OS X before 10.9.2 allows attackers to bypass the App Sandbox protection mechanism via crafted Mach messages.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.