CVE-2014-1265CVE-2014-1265

Affected configuration(s):

cpe:/o:apple:mac_os_x:10.7.0
cpe:/o:apple:mac_os_x:10.7.1
cpe:/o:apple:mac_os_x:10.7.2
cpe:/o:apple:mac_os_x:10.7.3
cpe:/o:apple:mac_os_x:10.7.4
cpe:/o:apple:mac_os_x:10.7.5
cpe:/o:apple:mac_os_x:10.8.0
cpe:/o:apple:mac_os_x:10.8.1
cpe:/o:apple:mac_os_x:10.8.2
cpe:/o:apple:mac_os_x:10.8.3
cpe:/o:apple:mac_os_x:10.8.4
cpe:/o:apple:mac_os_x:10.8.5
cpe:/o:apple:mac_os_x:10.8.5:supplemental_update
cpe:/o:apple:mac_os_x:10.9
cpe:/o:apple:mac_os_x:10.9.1
cpe:/o:apple:mac_os_x_server:10.7.0
cpe:/o:apple:mac_os_x_server:10.7.1
cpe:/o:apple:mac_os_x_server:10.7.2
cpe:/o:apple:mac_os_x_server:10.7.3
cpe:/o:apple:mac_os_x_server:10.7.4
cpe:/o:apple:mac_os_x_server:10.7.5

Date published: 2014-02-26T20:55:04.133-05:00

Date last modified: 2014-02-27T16:39:23.210-05:00

CVSS Score: 4.6

Principal attack vector: LOCAL

Complexity:  LOW

Reference URL: http://support.apple.com/kb/HT6150

Summary: The systemsetup program in the Date and Time subsystem in Apple OS X before 10.9.2 allows local users to bypass intended access restrictions by changing the current time on the system clock.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.